text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261126T132552000Z_0019601","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251124T220858000Z_0019603","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Credential Access","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260802T161241000Z_00...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Lateral Movement","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251124T151823000Z_0019607","ground_truth":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261116T162250000Z_0019609","ground_truth":{"detection_...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250910T001726000Z_0019611","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Impact"],"technique_id":"T1570"},"event_id":"evt_fin7_20260909T011237000Z_0019613","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260826T012149000Z_0019615","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251106T085727000Z_0019617","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Defense Evasion","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20250127T203210000Z_0019619","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260406T222418000Z_0019621","g...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260225T075843000Z_0019623","groun...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250714T152222000Z_001...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250203T192554000Z_0019627","ground_trut...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250927T142049000Z_0019629","groun...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250212T033038000Z_0019631","ground...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Execution","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250116T085809000Z_0019633","ground_t...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261225T045546000Z_0019635","ground_truth":{"detection_guidance":"Sigma ru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260110T115139000Z_001...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261005T014533000Z_0019639","ground_truth":{"de...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261117T144243000Z_0019641","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260606T145554000Z_0019643","ground_truth":{"detection_gu...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260930T164339000Z_0019645","gr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution","Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250316T192107000Z_0019647","ground_truth":{"detect...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260828T201735000Z_0019649","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260429T23402800...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260111T123747000Z_0019...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260216T042546000Z_0019655","ground_truth"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Defense Evasion","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260814T212959000Z_0019657","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260407T005900000Z_0019659","...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Collection"],"technique_id":"T1570"},"event_id":"evt_apt41_20260328T135133000Z_0019661","ground_truth":{"detection_guidance":"Sigma rule for T157...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Privilege Escalation","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261115T081140000Z_001966...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250421T165359000Z_0019667","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on s...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260910T223010000Z_0019669","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Lateral Movement","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250115T141207000Z_...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250831T013525000Z_0019673","ground_truth":...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260710T125254000Z_0019675","ground_t...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Exfiltration","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20250907T202556000Z_0019677","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250412T090809000Z_0019679","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250308T111724000Z_0019681","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Initial Access","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260417T215850000Z_0019683","ground_truth":{"detection_guida...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250319T075705000Z_0019685","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250814T051914000Z_0019687","ground_truth":{"de...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Execution"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250102T190319000Z_0019689","ground_truth":{"detection_gui...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20261230T120812000Z_0019691","grou...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250420T132557000Z_0019693","ground_truth":{"detection_gui...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251018T014944000Z_0019695","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250204T12064...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Impact"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250121T163636000Z_0019699","ground_truth":{"detection_gu...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mus...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251225T211128000Z_0019703","ground_truth":{"detection_guidan...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260318T145129000Z_0019705","ground_truth":{"detection_guidance...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250310T192758000Z_0019707","ground_truth":{"detection_guida...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261024T034329000Z_0019709","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | J...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261030T195534000Z_0019711","ground_tr...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20261004T034459000Z_0019713","ground_truth":{"detection...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260704T001648000Z_0019715","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251206T002526000Z...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Persistence","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250629T192639000Z_0019719","ground_truth":{"de...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251220T154322000Z_0019721","ground...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Exfiltration","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251104T132050000Z_0019723","ground_...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250613T115540000Z_0019725","grou...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261022T110604000Z_0019727","ground_truth":{"detection_...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20250220T095537000Z_0019729","ground_truth":{"detect...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250413T234140000Z_0019731","ground_truth":{"dete...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260216T085822000Z_0...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250121T114154000Z_0019735","ground_truth":{"detection_guida...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250115T034307000Z_0019737","ground_truth":{"detection_gu...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20260101T073850000Z_0019739","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Privilege Escalation","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250604T115614000Z_0019741",...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251209T021744000Z_0019743","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250523T104919000Z_0019745","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260610T010302000Z_0019747","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250812T120433000Z_0019749","ground_truth":{"detectio...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Command and Control","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250812T200942000Z_0019751","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250101T062854000Z_0019753","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 ...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Discovery","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250417T003018000Z_0019755","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250916T041024000Z_0019757","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250123T211356000Z_0019761","ground_truth":{"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260109T233338000Z_0019763","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260902T015420000Z_0019765","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20261228T191134000Z_0019767","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250422T173231000Z_0019769","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Initial Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260619T222621...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261029T120218000Z_0019773","ground_truth":{"detection_guidance":"Sigma rule for T1021.006...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260421T092351000Z_0019775","ground_truth...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_fin7_20250627T114133000Z_0019777","ground_truth":{"detection_guidance":"Sigma rule...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250904T093938000Z_0019779","ground_tru...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251005T171555000Z_0019781","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250422T200530000Z_0019783","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260107T020033000Z_0019785","ground_truth"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Privilege Escalation","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260515T004252000Z_0019787","ground_tr...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261201T104515000Z_001978...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251002T131008000Z_0019791","ground_tr...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260610T000...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Persistence","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250413T120544000Z_0019795","ground_truth":{"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260421T032240000Z_0019797","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260114T072704000Z_0019799","ground_truth":{"detectio...