text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260922T085513000Z_0014801","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260604T040211000Z_0014803","ground_truth":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Defense Evasion","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260909T123615000Z_0014805","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260109T185348000Z_0014807","...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260209T230636000Z_0014809","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260601T074918000Z_0014811","ground_truth":{"detection_guid...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250402T060427000Z_0014813",...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250622T080834000Z_0014815","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260301T035837000Z_0014817","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20250918T230445000Z_0014819","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250114T182346000Z_0014821","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250619T1422...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250728T030821000Z_0014825","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Impact","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260401T154938000Z_0014827","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251127...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251115T191228000Z_0014831","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250113T071813000Z_0014833","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Credential Access","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251218T165531000Z_0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261028T062839000Z_0014837","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251111T215904000Z_0014839","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 |...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260205T232...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250221T213710000Z_0014843","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260108T055132000Z_0014845","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250814T233951000Z_0014847","ground_truth":{"detectio...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250626T042743000Z_0014849","ground_truth":{"detection_guidance":"Sigma rule for T15...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260930T194511000Z_0014851","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Lateral Movement","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260807T144346000Z_0014855","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260322T112253000Z_0014857","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251109T022407000Z_0014859","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260703T152121000Z_0014861","gro...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250128T230101000Z_0014863","gro...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251223T223240000Z_0014865","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Impact"],"technique_id":"T1570"},"event_id":"evt_apt41_20260308T173121000Z_0014867","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260115T133216000Z_0014869","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251215T143315000Z_0014871","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251016T194521000Z_0014873"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250312T024100000Z_001487...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260609T062339000Z_0014877","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251120T161255000Z_0014879","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260111T002945000Z_0014881","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250910T232105000Z_0014883","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Privilege Escalation","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260723T212740000Z_0014885","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Defense Evasion","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250224T192120000Z_0014887","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250108T165908000Z_0014889","ground_tru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250722T132840000Z_0014891","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Lateral Movement","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250424T...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250924T044915000Z_0014895","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260709T012826000Z_00...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260312T231643000Z_0014899","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261127T160347000Z_0014901","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260912T201115000Z_0014903","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251116T171433000Z_0014905","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Execution","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250630T045722000Z_0014909","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Persistence","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261229T023254000Z_0014911","ground_trut...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260628T233753000Z_0...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250505T171524000Z_0014915","ground_truth":{"detection_guidan...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Privilege Escalation","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20261203T023225000Z_00149...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251116T061452000Z_0014919","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260822T061823000Z_0014921","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Credential Access","Initial Access"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260905T220559000Z_0014925","ground_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250621T143300000Z_0014927","ground_t...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251116T130737000Z_0014929","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251117T081135000Z_0014931","ground_truth":{"detect...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250217T135700000Z_0014933","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260710T201032000Z...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20250906T174734000Z_0014937","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260807T191716000Z_0014939","ground_tru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261005T171617000Z_0014941","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250409T122244000Z_0014943","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Impact","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251104T222805000Z_0014945","ground_truth":{"detection_guida...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261116T163037000Z_0014947","groun...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251215T161001000Z_0014949","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260222T200939000Z_0014951","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260807T165506000Z_0014953","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_apt41_20250811T142228000Z_0014955","ground_truth":{"detect...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Impact","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250322T094714000Z_00149...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260623T112128000Z_0014959","ground_tr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250824T215748000Z_0014961","ground_truth":{"detec...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250902T213015000Z_001496...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260218T024322000Z_0014965","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250307T005824000Z_0014967","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260521T21123300...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Execution","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260611T215310000Z_0014971","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250613T115202000Z_0014973","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260128T101617000Z_0014975","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Command and Control","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt41_20260410T024141000Z_0014977","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261108T024919000Z_0014979","ground_truth":{"det...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261004T013249000Z_0014981","ground_truth":{"detection_g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Reconnaissance","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2025...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Initial Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251226T163637000Z_0014985","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Collection","Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260517T143515000Z_0014987","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250730T202204000Z_0014989","ground_truth":{"detection_gu...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260801T194954000Z_0014991","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260122T050214...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260807T105432000Z_0014995"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20250821T082305000Z_0014997","ground_truth":{"detection_guidan...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260919T141420000Z_0014999","ground_truth...