text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261209T165554000Z_0016001","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250415T030410000Z_0016003","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 |...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260817T175058000Z_0016005","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Credential Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250718T103857000Z_0016007","ground_trut...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261209T034734000Z_0016009","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Defense Evasion","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260628T001708000Z_0016011","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251029T170201000Z_0016013","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250519T191725000Z_0016015","ground_truth":{"detecti...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Persistence"],"technique_id":"T1531"},"event_id":"evt_fin7_20250118T152514000Z_0016017","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Defense Evasion","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250909T210347000Z_0016019","gro...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260228T123356000Z_0016021","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20261115T202150000Z_0016023","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Discovery","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250126T145350000Z_001602...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250328T191611000Z_0016027","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250524T184432000Z_0016029","gr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261215T171308000Z_0016031","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260311T142638000Z_0016033","ground_tru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251003T212953000Z_0016035","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250428T09073900...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20251221T053135000Z_0016039","ground_truth":{"detection_g...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251103T131503000Z_0016041","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Exfiltration","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20261006T134325000Z_0016043","g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Persistence"],"technique_id":"T1531"},"event_id":"evt_apt41_20260923T091942000Z_0016045","ground_truth":{"detectio...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250725T102859000Z_0016047","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260902T014831000Z_0016049","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20251210T053223000Z_0016...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Impact"],"technique_id":"T1531"},"event_id":"evt_apt41_20251227T132619000Z_0016053","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Exfiltration","Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260701T011002000Z_0016055","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260908T141826000Z_0016057","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20250203T033230000Z_0016059","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20250409T202857000Z_0016061","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260120T190801000Z_0016063","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20261225T130413000Z_0016065","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260417T000221000Z_0016067","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260528T235017000Z_0016069","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20261228T225922000Z_0016071","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250105T000824000Z_0016073","...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260517T020414000Z_0016075","ground_truth":{"detection_guidance":"Sigma rule for T1059....
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260204T133656000Z_0016077",...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260425T162401...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Collection","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_2025081...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Initial Access","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260703T153522...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251008T223743000Z_0016085","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261231T084651000Z_0016087","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260902T002020000Z_0016089","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Privilege Escalation","Collection"],"technique_id":"T1531"},"event_id":"evt_apt29_20261216T104709000Z_0016091","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Discovery","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250519T115346000Z_0016093","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250528T022752000Z_0016095","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250207T105830000Z_0016097","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Exfiltration","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261121T181100000Z_0016099","gro...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250503T182614000Z_0016101","ground_truth":{"detectio...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260430T131136000Z_0016103","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence","Defense Evasion","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260716T122859000Z_0016105","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250922T074254000Z_0016107","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260517T025718000Z_0016109","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260218T18175...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260406T135615000Z_0016113","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260711T1...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Privilege Escalation","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260407T00090700...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250812T160653000Z_0016119","ground_truth":{"detection_guida...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250416T170813000Z_0016121","ground_truth":{"detection_gui...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260610T122409000Z_0016123","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Command and Control","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyp...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Impact","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250811T091043000Z_0016...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Collection"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251228T232052000Z_0...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_fin7_20260115T153508000Z_0016131","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260503T074309000Z_0016133",...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251204T112554000Z_0016135","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260527T201634000Z_0016137","ground_truth":{"detection_gu...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250304T162641000Z_0016139","ground_tru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260819T060517000Z_0016141","ground_truth":{"detection_gu...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260918T025507000Z_0016143","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250307T080328000Z_0016145","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260822T013522000Z_0016147","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Discovery","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261219T09...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261231T075423000Z_0016151","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250629T214047000Z_0016153","ground_truth":{"detection_guidance":"Sigma rule for T1021...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250318T164624000Z_0016155","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250218T045332000Z_0016157","ground_truth":{"d...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Lateral Movement","Command and Control"],"technique_id":"T1484.001"},"event_id":"e...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250101T175940000Z_0016...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact","Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260909T181814000Z_0016163","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Impact","Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250324T202845000Z_0016165","ground_truth":{"detection...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251026T123849000Z_0016167","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260704T115226000Z_0016169","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Impact","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250603T050850000Z_0016171","ground_truth":{"detection_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250603T002003000Z_0016173","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Execution"],"technique_id":"T1570"},"event_id":"evt_apt41_20260402T115105000Z_0016175","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260228T171249000Z_0016177","ground_tr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Privilege Escalation","Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260311T002747000Z_0016179","gro...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Exfiltration","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251118T003215000Z_0016181","ground_tru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260324T194237000Z_0016183","ground_truth":{"detection_guidance":"Sigma rule for T1098.00...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260225T...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250723T063935000Z_0016187","ground_truth":{"de...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250308T183152000Z_0016189","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260717T075244000Z_0016191","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250512T024139000Z_0016193","ground_truth":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250412T012145000Z_0016195","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260118T003735000Z_0016197","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Joi...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Execution","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260912T202723000Z_0016199","ground_tr...