text
stringlengths
1.13k
1.33k
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250521T212522000Z_0018001","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260114T001333000Z_0018003","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Initial Access","Impact"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250417T061440000Z_0018005","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Initial Access","Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261127T213936000Z_0018007","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution","Credential Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250405T1807...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261212T035731000Z_0018011","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250409T013600000Z_0018013","groun...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_2...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250114T072305000Z_0018017","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Lateral Movement","Collection"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251015T014318000Z_0018019","...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Exfiltration","Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260715T102812000Z_00...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250529T145134000Z_00...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Credential Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20261103T053136000Z_00180...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Persistence","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250527T023205000Z_0018027","ground_truth":{"d...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20250421T054818000Z_0018029","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_fin7_20250325T121318000Z_0018031","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261113T184518000Z_0018033","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260526T205210000Z_0018035","ground_truth":{...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260203T230720000Z_0018037...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_fin7_20260420T235529000Z_0018039","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Impact"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20251013T191535000...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250629T224925000Z_001...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_fin7_20250918T061046000Z_0018045","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250829T085534000Z_0018047","ground_truth":{"detection_guida...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260526T103727000Z_0018049","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250617T175135000Z_0018051","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Execution"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260429T125203000Z_0018053","ground_truth":{"detect...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260228T092720000Z_0018055","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control","Credential Access"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260211T2...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Persistence","Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250330T200315000Z_0018059","ground_truth":{"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance","Collection"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261118T144617000Z_0018061","ground_truth":{...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20260104T185313000Z_0018063","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260725T052418000Z_00...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Exfiltration","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261120T014233000Z_0018067","ground_truth":{"det...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260821T120623000Z_0018069","ground_truth":{"dete...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250603T003020000Z_0018071","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260705T175348000Z_0018073","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261211T204518000Z_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection","Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260124T110420000Z_0018077","ground_truth":{"detection_guidance":"Sigma rule for T1059...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Exfiltration","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260416T021648000Z_0018079","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250916T051757000Z_0018081","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Initial Access","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250624T160347000Z_0018083","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20250313T160829000Z_0018085","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Command and Control"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261201T125247000Z_0018087","ground_truth":{"d...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Credential Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260928T232544000Z_0018089","ground_truth":{"detection_guid...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250405T172145000Z_0018091","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Discovery"],"technique_id":"T1570"},"event_id":"evt_apt41_20250621T173803000Z_0018093","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260320T102138000Z_0018095","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260724T191051000Z_0018097","ground_truth":{"detection_gu...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_fin7_20251217T211334000Z_0018099","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251216T173537000Z_0018101","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260729T223208000Z_0018103","ground_truth":{"detec...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250520T175114000Z_0018105","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261130T201341000Z_0018107","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_apt29_20250522T055058000Z_0018109","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on sr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250913T112806000Z_0018111","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251024T191417000Z_0018113","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join o...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access","Impact"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250909T112604000Z_0018115","ground_truth":{"detection_guidance"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260627T134949000Z_0018117","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Command and Control","Discovery"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260421T090332000Z_0018119","gr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250724T153822000Z_0018121","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Exfiltration","Impact"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250104T004956000Z_0018123","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260112T161125000Z_0018125","ground_t...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Privilege Escalation","Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260820T050404000Z_0018127"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Execution","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt41_20260922T060449000Z_0018129","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250815T154427000Z_0018131","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Reconnaissance","Credential Access"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251022T101617000Z_0018133","ground_truth":{"detecti...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Privilege Escalation","Initial Access"],"technique_id":"T1570"},"event_id":"evt_fin7_20260730T201306000Z_0018135","ground_truth":{"detection...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Exfiltration","Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260722T234340000Z_0018137","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250308T221642000Z_0018139","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Persistence","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261119T095250000Z_0018141","ground_truth":{"detecti...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251227T114611000Z_0018143","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260814T075015000Z_0018145","ground...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Privilege Escalation","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scat...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation","Command and Control","Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260403T123120000Z_0018149","grou...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260203T112846000Z_0018151","...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260516T041902000Z_0018153","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Credential Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20261214T125932000Z_0018155...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Persistence","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20261126T100257000Z_0018157","ground_t...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20250520T012929000Z_0018159","ground_truth":{"detecti...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250610T092647000Z_0018161","ground_truth"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Discovery","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_apt29_20250303T042555000Z_0018163","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250908T225445000Z_0018165","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Collection","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260119T075132000Z_001816...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250215T023914000Z_0018169","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20260828T212853000Z_0018171","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250327T205139000Z_0018173","ground_tru...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Discovery","Collection"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251031T080636000Z_0018175","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260408T134229000Z_0018177","ground_truth":{"detection_guidance":"Sigma rule for T1059...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20251115T054756000Z_0018179","ground_truth":{"detectio...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Command and Control","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt41_20260423T213850000Z_0018181","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250313T164903000Z_00181...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260727T113236000Z_0018185","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260201T054323000Z_0018187","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260712T212940000Z_0018189","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260514T173820000Z_0018191","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250724T194716000Z_001819...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250920T094812000Z_0018195","ground_truth":{"detection_guidanc...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Execution"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260613T145638000Z_0018197","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Privilege Escalation","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250923T121848000Z_0...