text
stringlengths
1.13k
1.33k
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Credential Access","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260523T08380...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20251228T232355000Z_0000403","ground_truth":{"detectio...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Exfiltration","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_mustangp...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250304T012605000Z_0000407","ground_trut...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Impact","Collection","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260927T134935000Z_0000409","g...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260830T132809000Z_0000411","ground_truth":{"detection_guidance":"Sigma rule for T1570 | ...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Credential Access","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261208T215657000Z_0000413","gro...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20251107T103754000Z_0000415","ground_truth":{"detection_g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260915T051639000Z_0000...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260801T035518000Z_0000419","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Impact","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250622T074352000Z_0000421","ground_truth":{"detection_guidance":"S...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Collection","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_apt29_20260426T220154000Z_0000423","ground_...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20251127T044952000Z_0000425","ground_truth":{"d...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260610T041940000Z_0000427","ground_truth":{"detection_guidance":"Sigma rule for T1098.004...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251208T074731000Z_0000429","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261031T222734000Z_0000431","ground_truth":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Impact","Initial Access"],"technique_id":"T1531"},"event_id":"evt_fin7_20261106T233251000Z_0000433","ground_truth":{"detection_guidance":...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Reconnaissance","Command and Control"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260323T072812000Z_0000435","ground_truth":{"detection_guidance":"Sigma rule f...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20250727T213859000Z_0000437","ground_t...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Collection","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_202507...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250619T162139000Z_0000441","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250622T025025000Z_0000443","ground_trut...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251230T233020000Z_0000445","ground_truth":{"detection_guid...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261028T011515000Z_0000447","ground_truth":{"detection_guidan...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20250606T224235000Z_0000449","ground_truth":{"detection_guidance":"Sigma r...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact","Initial Access"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260606T222155000Z_0000451","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Persistence","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261207T150248000Z_0000453"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact"],"technique_id":"T1098.004"},"event_id":"evt_fin7_20261107T085551000Z_0000455","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Joi...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Privilege Escalation","Lateral Movement","Impact"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20261031T093227000Z_0000457","ground_truth":{"dete...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261228T123214000Z_0000459","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Lateral Movement","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_2025022...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250219T044242000Z_0000463","ground_truth":{"detection_guidance":"Sig...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250602T175345000Z_0000465","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | ...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection","Privilege Escalation","Persistence"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20250311T222158000Z_0000467","ground_truth":{"detect...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Collection","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260722T061319000Z_0000469","ground_truth":{"det...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Collection","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260127T20462...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Reconnaissance","Initial Access"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250522T110323000Z_0000473","ground_truth":{"d...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Execution"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20260618T210046000Z_0000475","ground_truth":{"detection_guidance":"Sigma rule fo...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20260829T201404000Z_0000477","ground_truth":{"det...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Execution","Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20261125T013227000Z_0000479","ground...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Command and Control","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt41_2025...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250806T091516000Z_0000483","ground_truth":{"detection_gui...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Exfiltration","Collection"],"technique_id":"T1570"},"event_id":"evt_fin7_20260305T232953000Z_0000485","ground_truth":{"detection_guidance":"Sigma ...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Exfiltration","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250816T171036000...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion","Execution","Reconnaissance"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20251009T041807000Z_000...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251115T211354000Z_0000491","...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement","Defense Evasion","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250207T21112100...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt41_20260201T094237000Z_0000495","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Joi...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Lateral Movement","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250109T08492...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Defense Evasion","Privilege Escalation","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt41_20260904T025011000Z_0000499","ground_truth":{"detection_g...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Discovery","Impact"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250423T072809000Z_0000501"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_mustangpanda_20251026T192631000Z_0000503","...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260417T005324000Z_0000505","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260224T083427000Z_0000507","ground_truth":{"detection...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Initial Access","Reconnaissance","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250928T124928000Z_0000509","ground_truth":{"dete...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20251102T151451000Z_0000511","ground_truth":{"detection_guidance":"Sigma rule for T1...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260512T0946...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20261108T095836000Z_0000515","ground_truth":{"detection_guidance":"Sigma rule for T109...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Discovery","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20250208T082213000Z_0000517","ground_truth":{"det...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact","Initial Access","Command and Control"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20260605T175731000Z_0000519","ground_truth":{"dete...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250317T063028000Z_0000521","ground_truth":{"d...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Discovery"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260810T200057000Z_0000523","ground_truth...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20251119T042748000Z_0000525","ground_truth":{"detection_guidance"...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Persistence","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260605T160020000Z_0000527","ground_truth":{"detection_gui...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Execution"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260901T024815000Z_0000529","ground_truth":{"detection_guidanc...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Reconnaissance","Execution"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260913T102302000Z_0000531","ground_truth":{"detectio...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Collection","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251125T062301000Z_0000533","ground_truth":{"detection...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20260502T170323000Z_0000535","ground_truth":{"detection_guidance":...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20251203T230046000Z_0000537","ground_truth":{"detection_guidance":"Sigma rule for...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Initial Access"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261129T015844000Z_0000539","ground_truth":{"detection_guidance":"Sigma...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20250201T153613000Z_0000541","ground_tru...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Initial Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250128T100709000Z_0000543","ground_truth":{"detection_gu...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Impact"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260125T142815000Z_0000545","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on sr...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20261110T141051000Z_0000547","ground_truth...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Exfiltration","Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250829T223317000Z_0000549","ground_truth":{"detect...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Collection","Impact"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250824T204500000Z_0000551","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20250208T233925000Z_0000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Credential Access","Reconnaissance","Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250723T022720000Z_0000555","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Collection"],"technique_id":"T1071.001"},"event_id":"evt_mustangpanda_20261009T192902000Z_0000557","ground_truth":{"detection_guidan...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Impact"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20251207T012911000Z_0000559...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration","Lateral Movement","Persistence"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261213T004429000Z_0000561","ground_truth":{"detection_...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260927T07572000...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Lateral Movement","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20250716T065906000Z_0000565","ground...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Command and Control","Persistence"],"technique_id":"T1570"},"event_id":"evt_unc4841_20251215T012147000Z_0000567","ground_truth":{"dete...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation","Discovery","Collection"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250818T090043000Z_0000569","grou...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260611T064030000Z_0000571","ground_truth":{"detection_guidance":"...
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250805T151208000Z_0000573","ground_truth":{"detection_guidance":"Sigma rule for T1570...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260102T134500000Z_0000575","ground_truth":{"detecti...
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Execution"],"technique_id":"T1570"},"event_id":"evt_fin7_20260331T003715000Z_0000577","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip w...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Reconnaissance","Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250220T093807000Z_0000...
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution","Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20250224T205144000Z_000058...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250321T133943000Z_0000583","ground_...
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251204T012334000Z_0000585","ground_truth":{"detection_guidance":"Si...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Impact","Exfiltration"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20261021T235231000Z_0000587","ground_truth":{"detection_guidance":"Sigm...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20250821T081540000Z_0000589","ground_truth":{"detection_guidance"...
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_scatteredspider_20250423T092412000Z_0000591","gro...
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20260310T154802000Z_0000593","ground_truth":{"detection_guidance":"Sigma rule for T10...
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Persistence","Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20250404T054357000Z_0000595","ground_trut...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Privilege Escalation","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260513T194627000Z_0000597","g...
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Discovery"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20260224T105919000Z_0000599","ground_truth":{"detection_guidance":"Sigma rule for T...