text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250916T203149000Z_0015001","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261017T005856000Z_0015003","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250515T083040000Z_0015005","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251003T215854000Z_0015007","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260525T214935000Z_0015009","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_apt29_20260309T100322000Z_0015011","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250107T221516...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250510T032028000Z_0015015","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Exfiltration","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250405T14573...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Initial Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250604T211029000Z_0015019","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Execution","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251014T145238000Z_0015021",...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260215T093848000Z_0015023",...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Initial Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250116T050749000Z_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260728T112953000Z_0015027","ground_truth":{"detection_guidance":"Sigma rule for T1059....
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251230T214421000Z_0015029","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250510T075326000Z_0015031","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Jo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260901T012709000Z_0015033","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260831T062546000Z_0015035","ground_truth":{"detection_guidance...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250427T144802000Z_0015037","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261205T210208000Z_0015039","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251106T194619000Z_0015041","gr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250608T125126000Z_001...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260626T040347000Z_0015045","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250821T073913000Z_0015047","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260903T184314000Z_0015049","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260125T051237000Z_0015051","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261229T041406000Z_0015053","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260709T120834000Z_0015055","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250321T202431000Z_0015057","ground_truth":{"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260508T201722000Z_0015059","ground_truth":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250508T111241000Z_0015061","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260104T155231000Z_0015063","ground_truth":{"detection_guidance"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260831T222430000Z_0015065","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251008T144516000Z_0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260601T093525000Z_0015069","ground_truth":{"det...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt41_20251102T082800000Z_0015071","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Collection","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250705T095653000Z_0015073","ground_trut...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260320T113445000Z_0015075",...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260506T142639000Z_0015077","gro...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250805T111516000Z_0015079","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260215T183024000Z_0015081","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Collection","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_scatteredsp...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250319T180557000Z_0015085","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Persistence","Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260211T124302000Z_0015087","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_2025...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251205T033701000Z_0015091","ground_trut...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251004T154524000Z_0015093","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250607T031939000Z_0015095","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250528T132356000Z_0015097","ground_truth":{"detection_guid...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260914T163358000Z_0015099","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20251030T045859000Z_0015101","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251014T135637000Z_0015103","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Impact","Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250331T012102000Z_0015105","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Impact"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250423T025154000Z_0015107","ground_truth":{"dete...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261114T030134000Z_0015109","grou...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260212T032711000Z_0015111","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Execution","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250502T043012000Z_0015113","ground_truth":{"detectio...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260411T035947000Z_0015115","gro...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250824T150857000Z_0015117","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250405T012312000Z_0015119","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260527T132840000Z_0015121","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250120T213633000Z_0015123","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Discovery","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261123T2345150...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Defense Evasion","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260306T153443000Z_0015127","ground_tru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250217T164408000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Exfiltration","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250330T185537000Z_0015131","ground_truth":{"detection_guida...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Exfiltration","Impact"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250514T133008000Z_0015133...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251027T104706000Z_0015135","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260520T0951550...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Credential Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250808T204413000Z...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Collection","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250928T164024000Z_0015141","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250120T204402000Z_0015143","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251104T170324000Z_0015145","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251007T173010000Z_0015147","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260531T024247000Z_0015149","ground_truth"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202608...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250424T073303000Z_0015153","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261210T073958000Z_0015155","ground_truth...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Impact","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260204T141446000Z_0015157","ground_truth":{"detection_guida...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251209T162015000Z_0015159","ground_truth":{"detection...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250428T101124000Z_0015161","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20261110T050157000Z_0015163","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Reconnaissance","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250323T065653000Z_0015165","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250409T135100000Z_0015167","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260131T141929000Z_0015169","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251129T204344000Z_0015171","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260601T132134000Z_0015173","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250305T163755000Z_0015175","ground_truth":{"detection_guida...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250323T111312000Z_0015177","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250830T102520000Z_0015179","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260419T140610000Z_0015181","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260718T104646000Z_0015183","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution","Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250414T211707000Z_0015185","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Reconnaissance","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250624T085058000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260227T214418000Z_0015189","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250222T004634000Z_0015191","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Execution","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250425T071017000Z_0015193","grou...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Initial Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260204...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250228T044503000Z_0015197","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250604T094002000Z_0015199","ground_tr...