text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250601T181058000Z_0019201","ground_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260414T005917000Z_0019203","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260730T030001000Z_0019205","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251209T131339000Z_0019207","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20260425T181424000Z_0019209","ground_truth":{"detecti...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251031T113837000Z_0019211","grou...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250423T043242000Z_0019213","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Collection","Credential Access"],"technique_id":"T1570"},"event_id":"evt_apt29_20251214T011138000Z_0019215","ground_truth":{"detection_guidanc...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260213T173755000Z_0019217","ground_tru...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250127T163839000Z_0019219","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Credential Access","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250518T194149000Z_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Command and Control","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251220T161902000Z_0019223","ground_trut...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260218T055924000Z_0019225","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260924T064535000Z_0019227","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20251019T202704000Z...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact"],"technique_id":"T1531"},"event_id":"evt_unc4841_20251218T173925000Z_0019231","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260407T152858000Z_0019233","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250909T074103000Z_0019235","grou...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250908T195945000Z_0019237","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Impact"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260217T023748000Z_0019239","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20251125T162516000Z_0019241","ground_truth":{"detection_g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251018T034236000Z_0019243","ground_truth":{"detec...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_fin7_20260307T074458000Z_0019245","ground_truth":{"detection...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Initial Access","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260824T0934270...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260721T001958000Z_0019249","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Exfiltration","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_2026122...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250606T012846000Z_0019253","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20260829T112001000Z_0019255","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Credential Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20251116T053559000Z_001...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration","Discovery"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260321T111741000Z_0019...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260818T142745000Z_0019261","ground_truth":{"de...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250730T045623000Z_0019263","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261117T211032000Z_0019265","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Privilege Escalation","Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20251207T052626000Z_0...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260326T043022000Z_0019269","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250616T195237000Z_0019271","ground_truth":{"detect...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250418T012331000Z_0019273","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance","Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20260325T120025000Z_0019...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Lateral Movement","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260217T115230000Z_0019277","ground_truth"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250519T212714000Z_0019279","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Discovery","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260909T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Impact","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250708T172711000Z_0019283","ground_truth":{"detection_guida...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250317T022906000Z_0019285","gr...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20251120T165005000Z_0019287","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250802T023621000Z_0019289","ground_trut...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250308T224553000Z_0019291","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_202511...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Impact"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260301T034406000Z_0019295","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20250301T044346000Z_0019297","grou...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20261202T083050000Z_0019299","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Execution","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20250313T053708000Z_0019301","gr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Lateral Movement","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260915T140112000Z_0019303","ground_...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250823T192005000Z_0019305","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Privilege Escalation","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260515T15...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250118T053716000Z_0019309","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260927T032323000Z_0019311","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Command and Control","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260520T160651000Z_0019313","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution","Discovery","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260704T134237000Z_0019315","ground_truth":{...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence","Credential Access","Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_apt29_20250512T152906000Z_0019317","grou...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250414T072652000Z_0019319","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Discovery","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251205T102419000Z_0019321","grou...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Privilege Escalation","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260408T162823000Z_0019323","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250923T115450000Z_0019325","gr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250819T07591...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Privilege Escalation","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260808T231522000Z_0019329","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Collection"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250815T124634000Z_0019331","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20261128T090720000Z_0019333","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20260702T154336000Z_0019335","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260725...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260222T082049000Z_0019339"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250814T020219000Z_0019341","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20251124T160657000Z_0019343","ground_truth":...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250501T210524000Z_0019345","ground_truth":{"detection_guidan...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Lateral Movement","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_vol...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260603T101346000Z_0019349","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Impact"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260516T054128000Z_0019351","ground_truth":{"detection_guidan...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Lateral Movement","Command and Control"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250926T224526000Z_0019353","ground_truth":{"detection...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250804T054541000Z_0019355","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20261208T025649000Z_0019357","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250907T174151000Z_0019359","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261031T034257000Z_0019361","ground_truth":{"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250616T161013000Z_0019363","...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Collection","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_apt41_20250929T034122000Z_0019365","ground_truth":{"detection_guidance":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Initial Access","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250713T190120000Z_0019367","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250214T142015000Z_0019369","ground_truth":{"detection_guidance":"Sigma rule for T102...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20250302T180153000Z_0019371","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260131T215339000Z_0019373","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260529T102534000Z_0019375","ground_trut...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Initial Access","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250701T181232000Z_0019377","ground_truth":{"detection...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Persistence","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260926T064817000Z_0019379","ground_truth":{"det...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250905T000132000Z_0019381","ground_truth":{"detecti...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20250224T003921000Z_0019383","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260305T215634000Z_0019385","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Persistence"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250513T014025000Z_0019387","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250916T164418000Z_0019389","ground_truth":{"detection_gu...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260628T162551000Z_0019391","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20261128T174401000Z_0019393","ground_truth":{"detection_gui...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Initial Access","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251230T144941000Z_0019395",...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_apt29_20251031T033656000Z_0019397","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251125T230746000Z_0019399","gro...