text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260726T044219000Z_0016801","ground...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Credential Access","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260917T162217...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20261125T024709000Z_0016805","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260522T170719000Z_0016807","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250609T042644000Z_0016809","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Execution"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250522T16190...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251216T105721000Z_0016813","ground_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251129T032012000Z_0016815","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Credential Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261024T031929000Z_00168...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Exfiltration","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260820T223826000Z_0016819","ground_truth":{"de...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Command and Control","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260328T031658000Z_0016821","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260827T021632000Z_0016823","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260812T023555000Z_0016825","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Execution"],"technique_id":"T1531"},"event_id":"evt_apt29_20250322T155203000Z_0016827","ground_truth":{"detection_g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260427T201536000Z_0016829","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scattered...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261103T231118000Z_0016833","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260116T233415000Z_0016835","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_202611...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260309T122203000Z_0016839","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Initial Access","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_fin7_20250330T153914000Z_0016841","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Command and Control","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260222T2...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250419T061631000Z_0016845","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_202603...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Defense Evasion","Impact"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260823T1357150...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250420T011206000Z_0016851","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260525T171026000Z_0016853","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251120T053721000Z_0016855","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Persistence","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250605T184407000Z_0016857","g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260319T115645000Z_0016859","ground_truth":{"detection_guidance":"Sigma rule for T1021.00...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250812T005206000Z_0016861","ground_truth":{"detection_g...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250628T013940000Z_0016863","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 |...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260205T130752000Z_0016865","gr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250307T042224000Z_0016867","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Discovery","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261001T143020000Z_001686...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Credential Access","Collection"],"technique_id":"T1531"},"event_id":"evt_apt29_20250806T211706000Z_0016871","...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260428T042850000Z_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250102T075017000Z_0016875","ground_tr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Command and Control","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250713T141809000Z_001687...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260919T085307000Z_0016879","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260910T153436000Z_0016881","ground_truth":{"detec...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261230T215818000Z_0016...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250521T152933000Z_0016885","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260315T074217000Z_0016887","ground_truth":{"detection_guidan...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260110T023343000Z_0016889","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Reconnaissance","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261119T203949000Z_0016891","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Impact"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250628T162700000Z_0016893","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260609T074854000Z_0016895","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260418T153011000Z_0016897","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251015T032356000Z_0016899","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_apt29_20250114T152404000Z_0016901","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260929T164233000Z_0016903","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251203T054650000Z_0016905","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261124T220937000Z_0016907","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261003T084936000Z_0016909","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Discovery","Impact"],"technique_id":"T1531"},"event_id":"evt_apt41_20251112T121351000Z_0016911","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Execution","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260330T060147000Z_0016913","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Collection","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260430T111454000Z_0016915","ground_truth":{"detection_g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Reconnaissance","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250804T080916000Z_0016917","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260430T215311000Z_0016919","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260712T092833000Z_0016921","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 |...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250817T050120000Z_0016923","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260926T190914000Z_0016925","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260906T112000000Z_0016927","ground_truth":{"detection_guid...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250628T201146000Z_0016929","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250530T134338000Z_0016931","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250426T181019000Z_0016933","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Persistence","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20251109T195909000Z_0016...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260806T173239000Z_0016937","ground_truth":{"detection_guidance...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20261012T222204000Z_0016939","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_202...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Command and Control","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261218T184113000Z_0016943","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20251225T202841000Z_0016945","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Command and Control","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250403T171...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Credential Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250326T045845000Z_00169...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260501T181204000Z_0016951","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250313T185815000Z_0016953","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250831T064614000Z_0016955","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260602T041452000Z_0016957","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20260908T124955000Z_0016959","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260310T083023000Z_0016961","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_apt41_20260405T124610000Z_0016963","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Privilege Escalation","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250719T052728000Z_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251012T062953000Z_0016967"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Credential Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt29_20260827T205837000Z_0016969","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20250803T180835000Z_0016971","gr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Execution","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260816T164459000Z_0016973","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Collection","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_202...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Discovery","Impact"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260510T154922000Z_0016977","ground_truth":{"detec...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260713T014244000Z_0016979","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Reconnaissance","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260202T011002000Z_0016981","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Reconnaissance","Execution"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261112T123951000Z_0016983"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260221T211055000Z_0016985","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260323T162526000Z_0016987","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250625T135015000Z_0016989","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260515T001229000Z_0016991","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260209T044417000Z_0016993","ground_truth":{"detection...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250830T083848000Z_0016995","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260208T081532000Z_0016997","ground_truth":{"detection_g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261127T033037000Z_0016999","ground_truth":{"detection_guidance":"Sigma rule ...