text
stringlengths
1.13k
1.33k
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250805T225302000Z_0017401","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251225T072956000Z_0017403","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260531T132422000Z_0017405","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Joi...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250519T0116...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Discovery"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260910T192828000Z_0017409","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Collection","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260505T160514000Z_0017411","ground...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250907T075353000Z_0017413","ground_truth":{"detecti...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Lateral Movement","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatt...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250322T200101000Z_0017417","grou...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Discovery","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250628T032411000Z_0017419","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250323T170208000Z_0017421","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260330T...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260424T042409000Z_0017425","gro...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250702T060827000Z_0017427","ground_truth":{"detection_g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Privilege Escalation","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260820T063837000Z_00174...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261130T215055000Z_0017431","ground_truth":{"detection_guidance...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Privilege Escalation","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_scatte...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251006T021639000Z_0017435","ground_truth":...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260704T170853000Z_0017437","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20261205T183852000Z_0017439","ground_truth":{"detec...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Command and Control","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20250921T165020000Z_0017441","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Impact"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250310T034714000Z_0017443","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250510T114249000Z_0017445","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260301T021427000Z_0017447","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Execution"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250111T162327000Z_0017449","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261019T061926000Z_0017451","groun...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Exfiltration","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250418T095332000Z_0017...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20261014T001648000Z_0017455","ground_truth":{"detection_gu...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Credential Access","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250509T032305000Z_0017457","...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260523T042800000Z_0017459","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250527T210321000Z_0017461","ground_truth":{"detection_guida...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Collection","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260714T032750000Z_0017463","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Execution","Collection","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261014T155938000Z_0017465","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250314T200539000Z_0017467","g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250918T072509000Z_0017469","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250103T185130000Z_0017471","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260128T031956000Z_0017473","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260730T05451300...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250521T004313000Z_0017477","ground_truth":{"de...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260718T141918000Z_0017479","ground_truth":{"detection_guidance":"Sigma rule for T1021.0...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Discovery","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261121T102346000Z_0017481","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Execution"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250416T202901000Z_0017483","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Impact","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260205T061038000Z_0017485"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Exfiltration","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260227T151420000Z_0017487...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260406T024331000Z_0017489","ground_tr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260901T123653000Z_0017491","ground_truth":{"detection_guidance":"Sigma rule for T1059...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250311T110901000Z_0017493","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260518T034022000Z_0017495","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250824T040243000Z_0017497","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260419T152100000Z_0017499","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_2026062...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_volttyph...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261014T050754000Z_0017505","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Persistence"],"technique_id":"T1570"},"event_id":"evt_apt29_20260724T010210000Z_0017507","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Exfiltration","Command and Control"],"technique_id":"T1484.001"},"event_id":"evt...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260324T002532000Z_0017511","ground_truth":{"detection_guidance":"Sigma rule for T1098.004...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control","Collection"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250310T133837000...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20251124T101059000Z_0017515","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250701T135811000Z_0017517","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Impact","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250908T035427000Z_0017519","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250121T011000000Z_0017521","ground_truth":{"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250327T150110000Z_0017523","ground_truth":{"detect...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251010T172909000Z_0017525","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Reconnaissance","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260210T180809000Z_0017527","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260617T133042000Z_0017529","ground_truth":{"detection_guidance":"Sigma rule for T1570 ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250412T135324000Z_001...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Execution"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260708T010539000Z_0017533","ground_truth":{...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Defense Evasion","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260623T20453...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Command and Control","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250830T004759000Z_0017537","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260110T153215000Z_0017539","ground_truth":{"detection_gui...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250401T071140000Z_0017541","ground_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20251008T223031000Z_0017543","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Persistence","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250630T172155000Z_0017545","ground_tru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260813T211818000Z_001...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260205T125446000Z_0017549","ground_truth":{"detecti...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250529T122221000Z_0017551","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Credential Access","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251014T225946000Z_0017553","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control","Persistence"],"technique_id":"T1531"},"event_id":"evt_apt41_20251127T133505000Z_0017555","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260217T085116000Z_0017557","ground_truth":{"detection_guidance":"Sigma rule for T1098....
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260610T090933000Z_0017559","ground_truth":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250320T173954000Z_0017561","ground_truth":{"detection_guidance":"Sigma rule for T1071...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251129T002012000Z_0...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Exfiltration","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251114T184445000Z_0017565","ground_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Defense Evasion","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250719T202255000Z_0017567","ground_truth...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250922T061259000Z_0017569","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Command and Control","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260113T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261231T041809000Z_0017573","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250831T231046000Z_0017575","ground_truth":{"detection_guidance":"Sigma rule for T...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250802T021522000Z_0017577","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20251023T021256000Z_0017579","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250906T141129...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260616T032707000Z_0017583","ground_tr...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_202608...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_apt41_20261229T173847000Z_0017587","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_202...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Collection","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20251003T050124000Z_0017591","ground_truth":{"detection_gui...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Reconnaissance","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260601T075737000Z_0017593","g...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20261025T111048000Z_0017595","ground_truth":{"detection_guidance":"Sigma rule for T1098.0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261119T063420000Z_0017597","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Privilege Escalation","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_2026...