text
stringlengths
1.13k
1.33k
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Persistence","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260308T150914000Z_0016601","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250523T230818000Z_0016603","ground_truth":{"detection_guidance":"Sigma rule for T102...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250102T170609000Z_0016605","ground_truth"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250107T135446000Z_0016607","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260222T055056000Z_0016609","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Lateral Movement","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260210T112357000Z_0016611","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251021T152640000Z_0016613","ground_truth":{"detection...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250309T132646000Z_0016615","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250806T162558000...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20251214T194923000Z_0016619","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260610T183152000Z_0016...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260101T070250000Z_0016623","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Persistence","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20251008T070932000Z_0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260418T114724000Z_0016627","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260308T040103000Z_0016629","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20260518T182006000Z_0016631","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_apt29_20251229T083333000Z_0016633","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Discovery","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250722T081732000Z_0016635","ground_truth...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Defense Evasion","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250413T135904000Z_0016637","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260119T050101000Z_0016639","ground_truth":{"detection_guidance...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260323T204827000Z_0016641","ground_truth":{"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250119T191152000Z_0016643","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Discovery","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251003T00252...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260426T063123000Z_0016647","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250726T073409000Z_0016649","gro...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251102T145553000Z_0016651","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250930T032716000Z_0016653","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Execution"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20261007T065243000Z_00166...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250126T045333000Z_0016657","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260325T145541000Z_0016659","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260117T095459000Z_0016661","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250410T060902000Z_0016663","ground_truth"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260722T204028000Z_0016665","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260518T070238000Z_0016667","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Exfiltration","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260104T191917000Z_0016669","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251217T053524000Z_0016671","ground_truth":{"det...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251111T042040000Z_0016673"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251121T185354000Z_0016675","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Discovery","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251224T183818000Z_0016677","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250616T085200000Z_0016679","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260824T022840000Z_0016681","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260601T124601000Z_0016683","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251122T163120000Z_001...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260824T044410000Z_0016687","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Impact","Execution"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261107T100449000Z_0016689","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260627T161627000Z_0016691","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Reconnaissance","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260319T103200000Z_0016693"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261027T214828000Z_0016695","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250416T092046000Z_0016697","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250324T2112260...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20261024T224430000Z_0016701","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250515T224050000Z_0016705","gr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260120T031428000Z_0016707","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250729T085235000Z_00167...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Credential Access","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251118T233152000Z_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20261118T050322000Z_0016713","ground_tru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Command and Control"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260614T005523000Z_0016715"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20260301T201239000Z_0016717","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Credential Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260601T021055000Z_0016721","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Defense Evasion","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250823T172800000Z_0016723","ground_t...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251002T082258000Z_0016725","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251009T182448000Z_0016727","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261218T193529000Z_0016729","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Collection","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250819T095802000Z_0016731","ground_truth":{"det...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261014T103142000Z_0016733","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260704T113812000Z_0016735","ground_truth":{"detection...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251111T145006000Z_0016737","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Discovery","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261104T053522000Z_0016739","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Discovery","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260212T233630000Z_0016741","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261002T005900000Z_0016743","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250719T040915000Z_0016745","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260411T111445000Z_0016747","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery","Defense Evasion","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251110T135710000Z_0016749","ground_truth":{"detection_guidance":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260113T045402000Z_0016751","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20251126T030715000Z_0016753","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261202T202707000Z_0016755","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20251207T195916000Z_0016757","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260507T192823000Z_0016759","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Exfiltration","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260428T204928000Z_0016761","ground_truth":{"detection_guid...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260414T114320000Z_0016763","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260713T202656000Z_0016765","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Discovery","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_202601...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20260216T094337000Z_0016769","ground_truth":{"detection_guidance":"Sigma rule for T1570 |...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Initial Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260709T154003000Z_0016771","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260604T162819000Z_0016773","ground_truth":{"detection_guidance...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260127T053619000Z_0016775","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251119T225704000Z_0016777","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250313T123040000Z_0016779","ground_truth":{"dete...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250522T193831000Z_0016781","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260507T083432000Z_0016783","ground_truth":{"detec...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Initial Access","Command and Control","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250321T042534000Z_0016785","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Reconnaissance","Persistence"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260711T070726000Z_0016787","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260120T084619000Z_0016789","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Command and Control","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260505T1523280...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250526T080423000Z_0016793","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Persistence","Execution"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260331T084811000Z_0016795","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspide...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Reconnaissance","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251122T142045000Z_001...