text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261105T105157000Z_0015401","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Initial Access","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250430T112143000Z_0015403","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250930T141942000Z_0015405","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Exfiltration","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260310T032650000Z_0015407","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Execution","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250302T231315000Z_0015409","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250527T080608000Z_0015411","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261201T135147000Z_0015413","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Lateral Movement","Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260404T125514000Z_0015415","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251106T180619000Z_0015417","ground_truth":{"detectio...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Credential Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250614T202203000Z_0015419"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Credential Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_fin7_20260129T012500000Z_0015421","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250727T120733000Z_0015423","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260219T083052000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Command and Control","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260519T1804060...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250803T040332000Z_0015429","ground_truth":{"detection_guidance"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Privilege Escalation","Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20250516T115834000Z_0015431","grou...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Impact"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261210T010746000Z_0015433","gro...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260320T035220000Z_0015435","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261018T031321000Z_0015437","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Collection","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250512T213443000Z_0015439","ground_truth"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260607T034128000Z_0015441","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Collection","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250126T130658000Z_0015443","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260419T042444000Z_0015445","ground_trut...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20251211T163743000Z_0015447","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20251228T144208000Z_0015449","...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251102T075629000Z_0015451","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt41_20261009T035745000Z_0015453","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Initial Access","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261219T190508...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Discovery","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251121T203500000Z_0015459","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250601T015830000Z_0015461"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261201T012942000Z_0015463","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250729T103717000Z_0015465","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250524T192740000Z_0015467","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20261206T091513000Z_0015469","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250924T204900000Z_0015471","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250513T042458000Z_0015473","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260916T001829000Z_0015475","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260926T073013000Z_0015477","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Jo...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260325T055926000Z_0015479","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Privilege Escalation","Impact"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260904T022805000Z_0015481","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Execution","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250719T102147000Z_0015483","ground_truth":{"de...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251106T150755000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Lateral Movement","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260826T001439000Z_0015487","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251023T124940000Z_0015489","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260919T042846000Z_0015491","ground_truth":{"detection_guidance":"Sigma rule for T1570 |...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Defense Evasion","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260816T05530600...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250218T034457000Z_0015495","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Command and Control","Initial Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250927T042359000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251219T123909000Z_0015499","ground_truth":{"d...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250224T113742000Z_0015501","g...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20250209T142420000Z_0015503","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250917T011201000Z_0015505","ground_truth":{"detection_guidance":"Sigma rule for T1059.0...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Impact","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250708T155609000Z_0015507","ground_truth":{"detection_guida...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion","Collection"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260409T050729000Z_0015509","ground_truth"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Execution","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260310T200856000Z_0015511","g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261220T001857000Z_0015513","ground_tru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_fin7_20251221T211033000Z_0015515","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260217T161201000Z_0015517","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260802T122703000Z_0015519","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_scattere...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20261201T012056000Z_0015523","ground_trut...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260225T052555000Z_0015525","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Defense Evasion","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250610T112802000Z_0015527","gro...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Execution","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260826T172124000Z_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250702T075237000Z_0015531","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260302T223438000Z_0015533","ground_truth":{"detection_guidance...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251210T001623000Z_0...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Defense Evasion","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260308T173049000Z_0015537"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Collection","Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20250101T165708000Z_0015539","ground_trut...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Discovery","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251125T100743000Z_0015541","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261012T135218000Z_0015543","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261129T142755000Z_0015545","ground_truth":...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260929T201458000Z_0015547","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250330T142431000Z_0015549","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260315T183130000Z_0015551","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Persistence","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260205T223944000Z_0015553","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261116T025124000Z_00155...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Credential Access","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251223T0325...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Execution","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261113T162716000Z_0015559","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251222T221220000Z_0015561","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260831T101216000Z_0015563","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Reconnaissance","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20251103T114711000Z_0015565","ground_truth":{...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260811T021255000Z_0015567","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261019T074030000Z_0015569","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261003T185924000Z_0015571","...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20251122T020655000Z_001...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250130T073604000Z_0015575","ground_t...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261005T233913000Z_0015577","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250809T200912000Z_0015579","ground_trut...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Impact","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260703T044005000Z_0015581","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Reconnaissance","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251223T185401000Z_0015583","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20251110T081914000Z_0015585","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260920T055921000Z_0015587"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260922T221123000Z_0015589","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Discovery","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260408T042023000Z_001559...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250827T182913000Z_0015593","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260617T204459000Z_0015595","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Privilege Escalation","Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261130T094806000Z_0015597","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250422T073732000Z_0015599","ground_truth":{"detection_guidance":"Sigma r...