text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20250527T044815000Z_0019401","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Initial Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250218T225424000Z_0019403","...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Collection"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20260101T112831000Z_0019405","ground_truth":{"detection_gui...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery","Command and Control","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_202...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Privilege Escalation","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20250607T1539590...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Initial Access","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery","Execution","Reconnaissance"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20261209T053052000Z_0019413","ground_truth":{"detection_gu...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_fin7_20260319T180329000Z_0019415","ground_truth":{"detection_guidance":"Sigma rule for ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20250911T185825000Z_0019417","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20251125T093506000Z_0019419","ground_truth":{"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Command and Control","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20260806T233...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260626T070827000Z_0019423","ground_truth":{"detection...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Privilege Escalation","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250913...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Persistence","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260225T155235000Z_0019427","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Impact","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260923T220832000Z_0019429","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250331T064911000Z_0019431","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Impact","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20250803T183218000Z_0019433","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250419T123829000Z_0019435","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20251106T094231000Z_0019437","ground_truth":{"detection_guidance":...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261116T124005000Z_0019439","ground_truth":{"detec...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261214T232045000Z_0019441","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Lateral Movement","Credential Access","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20250622T154854000Z_0019443","groun...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250427T073701000Z_0019445","ground_truth":{"detection_guidance...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration","Execution","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251015T063821000Z_0019447","ground_truth":{"detection_guid...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250129T211800000Z_0019449","ground_truth":{"d...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261110T011825000Z_0019451","ground_truth":{"detection_guidance":"Sigma rul...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20251031T193334000Z_0019453","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260418T190013000Z_0019455","ground_truth":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Execution","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251209T062054000Z_001945...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20251222T002220000Z_0019459","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Execution","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261225T135820000Z_0019461","groun...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Discovery"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20250108T052516000Z_0019463","ground_truth":{"detection_guid...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Exfiltration","Collection"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20260601T035222000Z_0019465","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20251207T141542000Z_0019467","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Discovery","Command and Control"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250804T114958000Z_0019471","ground_truth":{"detection_guidanc...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Exfiltration","Execution"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250322T030843000Z_0019473","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20260203T045541000Z_0019475","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20260329T005246000Z_0019477","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20260905T055648000Z_0019479","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260420T171531000Z_0019481","ground_tr...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250425T075116000Z_0019483","ground_truth":{"detection_guidance":"Sigma rule for T1021....
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Privilege Escalation","Command and Control"],"technique_id":"T1484.001"},"event_id":"e...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260712T140834000Z_0019487","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20260131T161856000Z_0019489","ground_truth"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250119T065154000Z_0019491","ground_truth":{"detection_guidance":"Sigma rule for T1059.00...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250901T064923000Z_0019493","ground_truth":{"detection_g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20261008T184159000Z_001...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250330T18...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260127T211109000Z_0019499","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Collection","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260322T063920000Z_0019501","ground_t...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20250528T024456000Z_0019...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Credential Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_apt41_20260306T172932000Z_0019505",...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250220T073313000Z_0019507","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Initial Access"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20261120T124037000Z_0019509","ground_truth":{"detecti...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250614T035410000Z_0019511","ground_truth":{"detection_guidanc...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260212T223956000Z_0019513","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250411T204511000Z_0019515","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Defense Evasion","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260108T124930000Z_0019517","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Reconnaissance","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251129T175114000Z_001...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20261124T180900000Z_001952...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250327T004711000Z_0019523","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Execution","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20251220T18...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250116T121356000Z_0019527","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260624T071849000Z_0019529","ground_truth":{"detectio...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20251005T094632000Z_0019531","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250908T043239000Z_0019533","ground_truth":{"detection_guidance":"Sigma rule for T1021....
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20251120T055410000Z_0019535","ground_truth...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Privilege Escalation","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260328T1729190...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Persistence"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260107T094323000Z_0019539","ground_truth":{"d...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control","Credential Access","Impact"],"technique_id":"T1484.001"},"event_id":"evt_mustangp...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Collection","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260309...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20260320T234231000Z_00...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20261108T042040000Z_0019547","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Execution"],"technique_id":"T1531"},"event_id":"evt_apt41_20250103T184115000Z_0019549","ground_truth":{"detection_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Discovery"],"technique_id":"T1531"},"event_id":"evt_fin7_20261219T132638000Z_0019551","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_apt29_20260522T033929000Z_0019553","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Execution","Impact","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20261107T155231000Z_0019555","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Initial Access","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250522T093737000Z_0019557","ground_truth...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250426T231554000Z_0019559","ground_truth":{"detectio...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Discovery","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250814T082938000Z_0019561","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20260819T213259000Z_0019563","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control","Discovery","Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20250608T213521000Z_0019565","grou...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250626T110402000Z_0019567","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Collection","Impact"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260503T044709000Z_0019569","ground_truth":{"detection_guidanc...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Exfiltration","Defense Evasion","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250320T061450000Z_0019571","ground_truth"...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251102T090301000Z_0019573","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Command and Control","Privilege Escalation","Persistence"],"technique_id":"T1059.001"},"event_id":"evt_fin7_20260517T210527000Z_0019575","ground_truth":{"detection_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Credential Access","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20261217T063132000Z_0019577","groun...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260807T073545000Z_0019579","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250827T195047000Z_0019581","ground_truth":{"detection_guidance":...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250121T051210000Z_0019583","gr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Command and Control","Discovery"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Collection"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260429T235609000Z_0019587","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Defense Evasion","Execution"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250531T031557000Z...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250611T052757000Z_0019591","ground_truth":{"det...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_apt29_20260716T171826000Z_0019593","ground_truth":{"detection_guidan...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261104T141631000Z_0019595","ground_truth":{"detection_guidance":"Sigma rule ...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Initial Access","Credential Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20251217T...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution","Exfiltration","Reconnaissance"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260730T012441000Z_0019599","ground_tr...